Fill in the blank: Cybersecurity aims to protect networks, devices, people, and data from _____ or unauthorized access.
1 point
poor financial management
market shifts
criminal exploitation
changing business priorities
2.
Question 2
What occurs during a security audit?
1 point
Ethical hacking of an organization’s internal network to identify vulnerabilities
Prioritizing tasks, processes, and procedures
Review of an organization’s security records, activities, and other related documents
Analyzing the efficiency of an organization’s internal network
3.
Question 3
Someone outside of an organization attempts to gain access to its private information. What type of threat does this scenario describe?
1 point
Accidental
External
Internal
Ethical
4.
Question 4
An individual has their personal information stolen. They discover that someone is using that information to impersonate them and commit fraud. What does this scenario describe?
1 point
Network infiltration
Data breach
Identity theft
Secured customer data
5.
Question 5
What is regulatory compliance?
1 point
Sites and services that require complex passwords to access
Expenses and fines associated with vulnerabilities
Laws and guidelines that require implementation of security standards
Threats and risks from employees and external vendors
6.
Question 6
An individual is in their first job as an entry-level security professional. They take training to learn more about the specific tools, procedures, and policies that are involved in their career. What does this scenario describe?
1 point
Improving management capabilities
Understanding different perspectives
Gaining new technical skills
Transferring capabilities from one career to another
7.
Question 7
Fill in the blank: Security information and _____ management (SIEM) tools enable security professionals to identify and analyze threats, risks, and vulnerabilities.
1 point
employer
enterprise
event
emergency
8.
Question 8
A security professional receives an alert about an unknown user accessing a system within their organization. They attempt to identify, analyze, and preserve the associated criminal evidence. What security task does this scenario describe?
1 point
Programming with code
Computer forensics
Resolving error messages
Software upgrades
9.
Question 9
Which of the following statements accurately describe personally identifiable information (PII) and sensitive personally identifiable information (SPII)? Select all that apply.
1 point
The theft of PII is often more damaging than the theft of SPII.
Both PII and SPII are vulnerable to identity theft.
An example of SPII is someone’s financial information.
An example of PII is someone’s date of birth.