Exam 3: Cybersecurity Framework

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Which of the following can achieve authentication in information security?

Free
(Multiple Choice)
4.9/5
(32)
Correct Answer:
Verified

D

Which of the following statements best describes NIST?

Free
(Multiple Choice)
4.8/5
(45)
Correct Answer:
Verified

C

Which of the following is not one of the "Five A's" of information security?

Free
(Multiple Choice)
4.9/5
(42)
Correct Answer:
Verified

A

CVSS is short for which of the following?

(Multiple Choice)
4.8/5
(35)

Which of the following best describes the accountability key information security principle?

(Multiple Choice)
4.8/5
(36)

The ISO 27002 standard has its origins in which of the following countries?

(Multiple Choice)
4.8/5
(39)

Which of the following best describes the accounting key information security principle?

(Multiple Choice)
4.8/5
(36)

Which of the following refers to a computer used in a DDoS attack?

(Multiple Choice)
4.8/5
(40)

Which of the following refers to those responsible for implementing, maintaining, and monitoring safeguards and systems?

(Multiple Choice)
4.9/5
(31)

Which of the following is an example of a security mechanism designed to preserve confidentiality?

(Multiple Choice)
4.9/5
(32)

Which of the following refers to the requirement that private or confidential information not be disclosed to unauthorized individuals?

(Multiple Choice)
4.7/5
(31)

Which of the following is a monitoring control that safeguards against the loss of integrity?

(Multiple Choice)
4.8/5
(30)

Which of the following key information security principles grants users and systems a predetermined level of access to information resources?

(Multiple Choice)
4.9/5
(38)

Which of the following is a behavioral control that can be used to safeguard against the loss of integrity?

(Multiple Choice)
4.8/5
(29)

Which of the following are the three elements of the CIA triad?

(Multiple Choice)
4.9/5
(33)

Which of the following is the official publication series for NIST standards and guidelines?

(Multiple Choice)
5.0/5
(35)

Which of the following NIST publications focuses on cybersecurity practices and guidelines?

(Multiple Choice)
4.9/5
(38)

Which of the following key information security principles traces actions to their source?

(Multiple Choice)
4.8/5
(32)

Which of the following is a network of the national standards institutes of more than 160 countries?

(Multiple Choice)
4.7/5
(34)

Which of the following is a collective term given to guidance on topics related to information systems security, predominantly regarding the planning, implementing, managing, and auditing of overall information security practices?

(Multiple Choice)
4.7/5
(33)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)