
MCyber_Chap22N23
Quiz
•
Information Technology (IT)
•
Professional Development
•
Practice Problem
•
Hard
Marcus Phang
FREE Resource
Enhance your content in a minute
22 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What law protects the privacy of an employee’s personal information from being shared with third parties?
Answer explanation
The Gramm-Leach-Bliley Act (GLBA) is a piece of legislation that mainly affects the financial industry.
However, a portion of that legislation also provides opt-out provisions for individuals, putting them in control of how the information they share with an organization during a business transaction is used.
The GLBA restricts information sharing with third party organizations.
2.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What is the primary goal of IT security governance?
Answer explanation
IT security governance determines who is authorized to make decisions about cybersecurity risks within an organization.
It demonstrates accountability and provides oversight to ensure that any risks are adequately mitigated and that security strategies are aligned with the organization’s business objectives and are compliant with regulations.
3.
MULTIPLE SELECT QUESTION
1 min • 1 pt
An organization has experienced several incidents involving employees downloading unauthorized software and using unauthorized websites and personal USB devices. What measures could the organization implement to manage these threats? (Choose three correct answers)
Answer explanation
An organization should implement measures to manage user threats, including:
1) Conduct security awareness training to prevent employees from falling victim to phishing scams.
2) Enabling content filtering to permit or deny specific domains in accordance with acceptable use policies.
3) Disabling internal CD drives and USB ports.
4) Enabling automatic antimalware scans for inserted media drives, files, and email attachments.
5) Allocating write and delete permissions to the data owner only.
4.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What federal act law would an individual be subject to if they knowingly accessed a government computer without permission?
Answer explanation
Enacted in 1986 as an amendment to the Comprehensive Crime Control Act of 1984, CFAA prohibits unauthorized access to computer systems.
Knowingly accessing a government computer without permission or accessing any computer used in or affecting interstate or foreign commerce is a criminal offense. The Act also criminalizes the trafficking of passwords or similar access information, as well as knowingly transmitting a program, code or a command that results in damage.
5.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
What do penetration tests and red team exercises achieve?
Answer explanation
Organizations with significant resources and cybersecurity expertise run penetration tests and red team exercises (simulated attack exercises) to gauge the security capabilities of an organization.
6.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
Which of the following frameworks identifies controls based on the latest information about common cyber attacks and provides benchmarks for various platforms?
Answer explanation
The Center for Internet Security (CIS) developed a set of critical security controls to help organizations with different levels of resources and expertise at their disposal to improve their cyber defenses.
7.
MULTIPLE CHOICE QUESTION
1 min • 1 pt
The ability to carry out highly specialized review and evaluation of incoming cybersecurity information to determine if it is useful for intelligence is covered in what category of the National Cybersecurity Workforce Framework?
Answer explanation
The National Institute of Standards and Technologies (NIST) created the National Cybersecurity Workforce Framework to support organizations seeking cybersecurity professionals. The framework organizes cybersecurity work into seven categories:
1) Operate and maintain – Provides the support, administration and maintenance required to ensure effective and efficient IT system performance and security.
2) Protect and defend – Identifies, analyzes, and mitigates threats to internal systems and networks.
3) Investigate – Investigates cybersecurity events and/or cyber-attacks involving IT resources.
4) Collect and operate – Provides specialized denial and deception operations and collection of cybersecurity information.
5) Analyze – Performs highly specialized review and evaluation of incoming cybersecurity information to determine its usefulness for intelligence.
6) Oversee and govern – Provides leadership, management, direction or development and advocacy so an organization may effectively conduct cybersecurity work.
7) Securely provision – Conceptualizes, designs, procures or builds secure IT systems.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
25 questions
E-USŁUGI
Quiz
•
Professional Development
25 questions
Chapter-1- Introduction to Web Development
Quiz
•
Professional Development
20 questions
Real-Life Applications of Data Mining
Quiz
•
Professional Development
20 questions
ITIL Foundation
Quiz
•
Professional Development
20 questions
Mastering PowerBI Concepts
Quiz
•
Professional Development
20 questions
STS 101 - Short PRETEST Activity
Quiz
•
Professional Development
18 questions
Refresh your knowledge in DE
Quiz
•
Professional Development
20 questions
Chapter 6: Designing a Vulnerability Management Program
Quiz
•
Professional Development
Popular Resources on Wayground
5 questions
This is not a...winter edition (Drawing game)
Quiz
•
1st - 5th Grade
15 questions
4:3 Model Multiplication of Decimals by Whole Numbers
Quiz
•
5th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
10 questions
The Best Christmas Pageant Ever Chapters 1 & 2
Quiz
•
4th Grade
12 questions
Unit 4 Review Day
Quiz
•
3rd Grade
10 questions
Identify Iconic Christmas Movie Scenes
Interactive video
•
6th - 10th Grade
20 questions
Christmas Trivia
Quiz
•
6th - 8th Grade
18 questions
Kids Christmas Trivia
Quiz
•
KG - 5th Grade
