A) Strength in numbers B) Locked and bolted C) Free from care D) To protect or guard
A) Maximum speed of network data B) The elimination of all software bugs C) The state of being free from danger D) Physical isolation of all servers
A) Threat B) Assets C) Mitigation D) Vulnerability
A) A potential danger to a company's assets B) A mechanism that takes advantage of a mechanism C) A weakness in a system or design that could be exploited D) The counter-measure that reduces the likelihood of an attack
A) An exploit is the likelihood of an event, while a threat is a counter-measure B) They are identical terms in modern network security C) A threat is potential danger; an exploit is the mechanism used to take advantage of a vulnerability D) A threat is a weakness, while an exploit is a dange
A) The process of identifying all assets in an organization B) The act of intentionally leaking data to the outside world C) The counter-measure that reduces the severity of a potential threat D) The likelihood of a threat to exploit a vulnerability
A) Hardware age and Software version B) Number of users and amount of data C) Probability of occurrence and its consequences D) Speed and Cost
A) Profitability B) Confidentiality C) Availability D) Integrity
A) They no longer target critical infrastructure B) They are using stealth and evasion techniques to hide their activity C) They only target individual home users now D) They have stopped using malware entirely
A) The physical location of an attacker B) A software that prevents viruses from entering a system C) The final result of a successful security breach D) A path by which a threat actor can gain access to a server, host, or network
A) External threats are easier to ignore B) Internal users always have better hacking tools C) Internal users have direct access to the building and infrastructure D) Firewalls only block internal traffic
A) An automated bot scanning the web for open ports B) A hacker in another country brute-forcing a password C) Disconnecting a critical network connection and causing an outage D) A global DDoS attack originating from the internet
A) Automatic system upgrades B) Increased customer trust C) Decreased litigation costs D) Brand damage and loss of reputation
A) Email/Social Networking B) Hard Copy C) Removable Media D) Unencrypted Devices
A) Encryption is only used for internet traffic B) Encrypted devices are easier to lose C) Encryption makes the device run slower D) If the data is not encrypted, a thief can retrieve valuable confidential data
A) They automatically encrypt all data they touch B) They are only dangerous if they are empty C) Employees could perform an unauthorized transfer of data to the drive D) They consume too much power from the computer
A) Using invisible ink B) Lamination C) Scanning everything into the cloud D) Confidential data should be shredded when no longer required
A) Too many people having access to the building's cafeteria B) Weak passwords that have been compromised provide easy access to data C) Using a keyboard instead of a mouse D) Computers being left on overnight
A) Sensitive data can be lost if access is compromised due to weak security settings B) It is impossible to store confidential data in the cloud C) Cloud storage only works during the daytime D) The data becomes too heavy for the internet to carry
A) Protecting the public internet B) Protecting your assets C) Protecting your competitors D) Protecting only your hardware
A) Giving everyone administrative access B) Detecting when, how, and by whom an asset has been damaged C) Deleting data every 24 hours D) Ensuring no one can ever use the computer
A) Blame the network provider B) Buy a cheaper version of the asset C) Forget about the asset D) Recover your assets
A) The physical building of the company B) Intangible creations of the human intellect, like designs or trade secrets C) The public social media posts of the company D) The chairs and desks in the office
A) Because adversaries are amassing and refining cyber weaponry quickly B) Because hackers only attack during the night C) To increase the company's internet speed D) To ensure employees type faster
A) Only from physical USB drives B) Inside or outside the corporate network C) Only from the internet D) Only from the server room
A) Reduction in security budget B) Loss of revenue C) Increase in competitive advantage D) Faster recovery from hardware failures
A) The process of taking legal action B) A type of malware used by internal users C) The act of encrypting a hard drive D) The process of fixing a broken server
A) Backing up data to a secondary server B) Deleting data to save space C) The unauthorized transfer of data from a computer D) Scanning data for viruses
A) Create a new internet for the company B) Increase the physical size of the monitors C) Compromise internal servers or network infrastructure devices D) Remove the need for a firewall
A) Mitigation B) Threat C) Requirement D) Asset |