Module 1 challenge

Fill in the blank: Cybersecurity aims to protect networks, devices, people, and data from _____ or unauthorized access.

1 point

poor financial management

market shifts

criminal exploitation

changing business priorities

2.

Question 2

What occurs during a security audit?

1 point

Ethical hacking of an organization’s internal network to identify vulnerabilities

Prioritizing tasks, processes, and procedures

Review of an organization’s security records, activities, and other related documents

Analyzing the efficiency of an organization’s internal network

3.

Question 3

Someone outside of an organization attempts to gain access to its private information. What type of threat does this scenario describe?

1 point

Accidental

External

Internal

Ethical

4.

Question 4

An individual has their personal information stolen. They discover that someone is using that information to impersonate them and commit fraud. What does this scenario describe?

1 point

Network infiltration

Data breach

Identity theft

Secured customer data

5.

Question 5

What is regulatory compliance?

1 point

Sites and services that require complex passwords to access

Expenses and fines associated with vulnerabilities

Laws and guidelines that require implementation of security standards

Threats and risks from employees and external vendors

6.

Question 6

An individual is in their first job as an entry-level security professional. They take training to learn more about the specific tools, procedures, and policies that are involved in their career. What does this scenario describe?

1 point

Improving management capabilities

Understanding different perspectives

Gaining new technical skills

Transferring capabilities from one career to another

7.

Question 7

Fill in the blank: Security information and _____ management (SIEM) tools enable security professionals to identify and analyze threats, risks, and vulnerabilities.

1 point

employer

enterprise

event

emergency

8.

Question 8

A security professional receives an alert about an unknown user accessing a system within their organization. They attempt to identify, analyze, and preserve the associated criminal evidence. What security task does this scenario describe?

1 point

Programming with code

Computer forensics

Resolving error messages

Software upgrades

9.

Question 9

Which of the following statements accurately describe personally identifiable information (PII) and sensitive personally identifiable information (SPII)? Select all that apply.

1 point

The theft of PII is often more damaging than the theft of SPII.

Both PII and SPII are vulnerable to identity theft.

An example of SPII is someone’s financial information.

An example of PII is someone’s date of birth.

0 0 votes
Article Rating
Subscribe
Notify of
guest
0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x