
MCyber_Chap22N23
Authored by Marcus Phang
Information Technology (IT)
Professional Development
Used 3+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
22 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What law protects the privacy of an employee’s personal information from being shared with third parties?
Answer explanation
The Gramm-Leach-Bliley Act (GLBA) is a piece of legislation that mainly affects the financial industry.
However, a portion of that legislation also provides opt-out provisions for individuals, putting them in control of how the information they share with an organization during a business transaction is used.
The GLBA restricts information sharing with third party organizations.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is the primary goal of IT security governance?
Answer explanation
IT security governance determines who is authorized to make decisions about cybersecurity risks within an organization.
It demonstrates accountability and provides oversight to ensure that any risks are adequately mitigated and that security strategies are aligned with the organization’s business objectives and are compliant with regulations.
3.
MULTIPLE SELECT QUESTION
1 min • 1 pt
An organization has experienced several incidents involving employees downloading unauthorized software and using unauthorized websites and personal USB devices. What measures could the organization implement to manage these threats? (Choose three correct answers)
Answer explanation
An organization should implement measures to manage user threats, including:
1) Conduct security awareness training to prevent employees from falling victim to phishing scams.
2) Enabling content filtering to permit or deny specific domains in accordance with acceptable use policies.
3) Disabling internal CD drives and USB ports.
4) Enabling automatic antimalware scans for inserted media drives, files, and email attachments.
5) Allocating write and delete permissions to the data owner only.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What federal act law would an individual be subject to if they knowingly accessed a government computer without permission?
Answer explanation
Enacted in 1986 as an amendment to the Comprehensive Crime Control Act of 1984, CFAA prohibits unauthorized access to computer systems.
Knowingly accessing a government computer without permission or accessing any computer used in or affecting interstate or foreign commerce is a criminal offense. The Act also criminalizes the trafficking of passwords or similar access information, as well as knowingly transmitting a program, code or a command that results in damage.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What do penetration tests and red team exercises achieve?
Answer explanation
Organizations with significant resources and cybersecurity expertise run penetration tests and red team exercises (simulated attack exercises) to gauge the security capabilities of an organization.
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following frameworks identifies controls based on the latest information about common cyber attacks and provides benchmarks for various platforms?
Answer explanation
The Center for Internet Security (CIS) developed a set of critical security controls to help organizations with different levels of resources and expertise at their disposal to improve their cyber defenses.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
The ability to carry out highly specialized review and evaluation of incoming cybersecurity information to determine if it is useful for intelligence is covered in what category of the National Cybersecurity Workforce Framework?
Answer explanation
The National Institute of Standards and Technologies (NIST) created the National Cybersecurity Workforce Framework to support organizations seeking cybersecurity professionals. The framework organizes cybersecurity work into seven categories:
1) Operate and maintain – Provides the support, administration and maintenance required to ensure effective and efficient IT system performance and security.
2) Protect and defend – Identifies, analyzes, and mitigates threats to internal systems and networks.
3) Investigate – Investigates cybersecurity events and/or cyber-attacks involving IT resources.
4) Collect and operate – Provides specialized denial and deception operations and collection of cybersecurity information.
5) Analyze – Performs highly specialized review and evaluation of incoming cybersecurity information to determine its usefulness for intelligence.
6) Oversee and govern – Provides leadership, management, direction or development and advocacy so an organization may effectively conduct cybersecurity work.
7) Securely provision – Conceptualizes, designs, procures or builds secure IT systems.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
20 questions
ITIL Foundation
Quiz
•
Professional Development
20 questions
Mastering PowerBI Concepts
Quiz
•
Professional Development
20 questions
STS 101 - Short PRETEST Activity
Quiz
•
Professional Development
18 questions
Refresh your knowledge in DE
Quiz
•
Professional Development
20 questions
Chapter 6: Designing a Vulnerability Management Program
Quiz
•
Professional Development
25 questions
E-USŁUGI
Quiz
•
Professional Development
25 questions
Chapter-1- Introduction to Web Development
Quiz
•
Professional Development
20 questions
Real-Life Applications of Data Mining
Quiz
•
Professional Development
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
10 questions
Probability Practice
Quiz
•
4th Grade
15 questions
Probability on Number LIne
Quiz
•
4th Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
22 questions
fractions
Quiz
•
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
•
7th Grade
10 questions
Greek Bases tele and phon
Quiz
•
6th - 8th Grade
Discover more resources for Information Technology (IT)
20 questions
Black History Month Trivia Game #1
Quiz
•
Professional Development
20 questions
90s Cartoons
Quiz
•
Professional Development
12 questions
Mardi Gras Trivia
Quiz
•
Professional Development
7 questions
Copy of G5_U5_L14_22-23
Lesson
•
KG - Professional Dev...
12 questions
Unit 5: Puerto Rico W1
Quiz
•
Professional Development
42 questions
LOTE_SPN2 5WEEK2 Day 4 We They Actividad 3
Quiz
•
Professional Development
15 questions
Balance Equations Hangers
Quiz
•
Professional Development
31 questions
Servsafe Food Manager Practice Test 2021- Part 1
Quiz
•
9th Grade - Professio...