Exam 16: Cybersecurity
Exam 1: Accounting As Information98 Questions
Exam 2: Risks and Risk Assessments100 Questions
Exam 3: Risk Management and Internal Controls100 Questions
Exam 4: Software and Systems106 Questions
Exam 5: Data Storage and Analysis98 Questions
Exam 6: Systems and Database Design98 Questions
Exam 7: Emerging and Disruptive Technologies100 Questions
Exam 8: Documenting Systems and Processes100 Questions
Exam 9: Human Resources and Payroll Processes100 Questions
Exam 10: Purchasing and Payments Process100 Questions
Exam 11: Conversion Processes100 Questions
Exam 12: Marketing, Sales, and Collection Processes100 Questions
Exam 13: Financial Reporting Processes103 Questions
Exam 14: Information Systems and Controls100 Questions
Exam 15: Fraud100 Questions
Exam 16: Cybersecurity99 Questions
Exam 17: Data Analytics99 Questions
Exam 18: Data Visualization100 Questions
Exam 19: Audit Assurance86 Questions
Select questions type
RAM Manufacturing LLC is a rapidly growing manufacturer of parts for the automotive industry. Maeve is an IT auditor at RAM Manufacturing, working on a project for the Cybersecurity department. Maeve has prioritized the following cyberattack categories:
• Denial-of-service attacks
• Viruses
• Worms
• Logic bombs
• Trojan horses
Match the following attack description to one of these cyberattack categories.
-Many RAM Manufacturing employees received an email from prompting them to install a new expense reporting system. Employees who downloaded the software experienced no disruption and the attack did not replicate itself.
(Multiple Choice)
4.7/5
(51)
The National Institute of Standards and Technology (NIST) has published Security and Privacy Controls for Federal Information Systems and Organizations (NIST-800-53). The NIST-800-53 document is divided into
(Multiple Choice)
4.9/5
(32)
What step do reconnaissance attacks correspond to in the cyber-kill chain?
(Multiple Choice)
4.7/5
(34)
A business can protect itself from DoS and DDoS attacks by ensuring that firewalls, ________, and intrusion detection systems are up-to-date, are properly configured, and will automatically block the ports where fake requests enter the system.
(Multiple Choice)
4.7/5
(40)
RAM Manufacturing LLC is a rapidly growing manufacturer of parts for the automotive industry. Maeve is an IT auditor at RAM Manufacturing, working on a project for the Cybersecurity department. Maeve has prioritized the following cyberattack categories:
• Denial-of-service attacks
• Viruses
• Worms
• Logic bombs
• Trojan horses
Match the following attack description to one of these cyberattack categories.
-An employee was granted a large increase in memory on his laptop and then requested an additional increase one week later. Upon investigation, highly replicative malicious code was found on is computer.
(Multiple Choice)
4.9/5
(32)
Which of the following reflects the correct sequence of the three steps of the cyber-kill chain?
(Multiple Choice)
4.8/5
(32)
The National Institute of Standards and Technology (NIST) has published Security and Privacy Controls for Federal Information Systems and Organizations (NIST-800-53). The NIST-800-53 document is
(Multiple Choice)
4.9/5
(26)
At larger companies, the cybersecurity program is usually the responsibility of a dedicated executive leader. This could include the
(Multiple Choice)
4.8/5
(38)
Match the cybersecurity threat to the following control activity:
-Review and update the baseline configuration of the information system using a company-defined frequency.
(Multiple Choice)
4.9/5
(35)
The National Institute of Standards and Technology (NIST) has published Security and Privacy Controls for Federal Information Systems and Organizations (NIST-800-53). One of the control families is Awareness and Training. What ID does Awareness and Training family use?
(Multiple Choice)
4.7/5
(46)
The National Institute of Standards and Technology (NIST) has published Security and Privacy Controls for Federal Information Systems and Organizations (NIST-800-53). The NIST-800-53 document is divided into 18 control families. One of the control families is Security Assessment and Authorization. What ID does Security Assessment and Authorization family use?
(Multiple Choice)
4.8/5
(30)
RAM Manufacturing LLC is a rapidly growing manufacturer of parts for the automotive industry. Maeve is an IT auditor at RAM Manufacturing, working on a project for the Cybersecurity department. Maeve has prioritized the following cyberattack categories:
• Denial-of-service attacks
• Viruses
• Worms
• Logic bombs
• Trojan horses
Match the following attack description to one of these cyberattack categories.
-Mobile app orders experienced an unprecedented increase at an unusual time of day that resulted in the order system crashing.
(Multiple Choice)
4.8/5
(35)
A company's best defense against phishing attacks is to train employees to recognize and report red flags. The correct definition of a poor grammar or spelling red flag is
(Multiple Choice)
4.8/5
(33)
Florida Water Supply, a water treatment facility, is an example of being hacked to
(Multiple Choice)
4.7/5
(32)
Which of the following logical access attacks is a brute-force attack?
(Multiple Choice)
4.9/5
(49)
The National Institute of Standards and Technology (NIST) has published Security and Privacy Controls for Federal Information Systems and Organizations (NIST-800-53). The NIST-800-53 document is divided into 18 control families. One of the control families is Personal Security. What ID does Personal Security family use?
(Multiple Choice)
4.9/5
(46)
Showing 21 - 40 of 99
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)