Exam 3: Cybersecurity Framework
Exam 1: Understanding Cybersecurity Policy and Governance20 Questions
Exam 2: Cybersecurity Policy Organization, Format, and Styles20 Questions
Exam 3: Cybersecurity Framework20 Questions
Exam 4: Governance and Risk Management20 Questions
Exam 5: Asset Management and Data Loss Prevention19 Questions
Exam 6: Human Resources Security20 Questions
Exam 7: Physical and Environmental Security19 Questions
Exam 8: Communications and Operations Security19 Questions
Exam 9: Access Control Management18 Questions
Exam 10: Information Systems Acquisition, Development, and Maintenance20 Questions
Exam 11: Cybersecurity Incident Response20 Questions
Exam 12: Business Continuity Management20 Questions
Exam 13: Regulatory Compliance for Financial Institutions20 Questions
Exam 14: Regulatory Compliance for the Health-Care Sector20 Questions
Exam 15: PCI Compliance for Merchants20 Questions
Exam 16: Nist Cybersecurity Framework20 Questions
Select questions type
Which of the following can achieve authentication in information security?
Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
D
Which of the following statements best describes NIST?
Free
(Multiple Choice)
4.8/5
(45)
Correct Answer:
C
Which of the following is not one of the "Five A's" of information security?
Free
(Multiple Choice)
4.9/5
(42)
Correct Answer:
A
Which of the following best describes the accountability key information security principle?
(Multiple Choice)
4.8/5
(36)
The ISO 27002 standard has its origins in which of the following countries?
(Multiple Choice)
4.8/5
(39)
Which of the following best describes the accounting key information security principle?
(Multiple Choice)
4.8/5
(36)
Which of the following refers to a computer used in a DDoS attack?
(Multiple Choice)
4.8/5
(40)
Which of the following refers to those responsible for implementing, maintaining, and monitoring safeguards and systems?
(Multiple Choice)
4.9/5
(31)
Which of the following is an example of a security mechanism designed to preserve confidentiality?
(Multiple Choice)
4.9/5
(32)
Which of the following refers to the requirement that private or confidential information not be disclosed to unauthorized individuals?
(Multiple Choice)
4.7/5
(31)
Which of the following is a monitoring control that safeguards against the loss of integrity?
(Multiple Choice)
4.8/5
(30)
Which of the following key information security principles grants users and systems a predetermined level of access to information resources?
(Multiple Choice)
4.9/5
(38)
Which of the following is a behavioral control that can be used to safeguard against the loss of integrity?
(Multiple Choice)
4.8/5
(29)
Which of the following are the three elements of the CIA triad?
(Multiple Choice)
4.9/5
(33)
Which of the following is the official publication series for NIST standards and guidelines?
(Multiple Choice)
5.0/5
(35)
Which of the following NIST publications focuses on cybersecurity practices and guidelines?
(Multiple Choice)
4.9/5
(38)
Which of the following key information security principles traces actions to their source?
(Multiple Choice)
4.8/5
(32)
Which of the following is a network of the national standards institutes of more than 160 countries?
(Multiple Choice)
4.7/5
(34)
Which of the following is a collective term given to guidance on topics related to information systems security, predominantly regarding the planning, implementing, managing, and auditing of overall information security practices?
(Multiple Choice)
4.7/5
(33)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)