A) To protect or guard B) Free from care C) Locked and bolted D) Strength in numbers
A) Physical isolation of all servers B) The elimination of all software bugs C) Maximum speed of network data D) The state of being free from danger
A) Mitigation B) Threat C) Assets D) Vulnerability
A) A potential danger to a company's assets B) A mechanism that takes advantage of a mechanism C) The counter-measure that reduces the likelihood of an attack D) A weakness in a system or design that could be exploited
A) They are identical terms in modern network security B) A threat is potential danger; an exploit is the mechanism used to take advantage of a vulnerability C) An exploit is the likelihood of an event, while a threat is a counter-measure D) A threat is a weakness, while an exploit is a dange
A) The likelihood of a threat to exploit a vulnerability B) The counter-measure that reduces the severity of a potential threat C) The process of identifying all assets in an organization D) The act of intentionally leaking data to the outside world
A) Speed and Cost B) Hardware age and Software version C) Number of users and amount of data D) Probability of occurrence and its consequences
A) Confidentiality B) Availability C) Profitability D) Integrity
A) They have stopped using malware entirely B) They no longer target critical infrastructure C) They are using stealth and evasion techniques to hide their activity D) They only target individual home users now
A) The physical location of an attacker B) A software that prevents viruses from entering a system C) A path by which a threat actor can gain access to a server, host, or network D) The final result of a successful security breach
A) Internal users have direct access to the building and infrastructure B) Firewalls only block internal traffic C) External threats are easier to ignore D) Internal users always have better hacking tools
A) Disconnecting a critical network connection and causing an outage B) A global DDoS attack originating from the internet C) A hacker in another country brute-forcing a password D) An automated bot scanning the web for open ports
A) Brand damage and loss of reputation B) Automatic system upgrades C) Decreased litigation costs D) Increased customer trust
A) Unencrypted Devices B) Removable Media C) Hard Copy D) Email/Social Networking
A) Encryption makes the device run slower B) Encryption is only used for internet traffic C) Encrypted devices are easier to lose D) If the data is not encrypted, a thief can retrieve valuable confidential data
A) They consume too much power from the computer B) They automatically encrypt all data they touch C) Employees could perform an unauthorized transfer of data to the drive D) They are only dangerous if they are empty
A) Confidential data should be shredded when no longer required B) Using invisible ink C) Scanning everything into the cloud D) Lamination
A) Using a keyboard instead of a mouse B) Computers being left on overnight C) Weak passwords that have been compromised provide easy access to data D) Too many people having access to the building's cafeteria
A) Cloud storage only works during the daytime B) It is impossible to store confidential data in the cloud C) Sensitive data can be lost if access is compromised due to weak security settings D) The data becomes too heavy for the internet to carry
A) Protecting the public internet B) Protecting only your hardware C) Protecting your competitors D) Protecting your assets
A) Deleting data every 24 hours B) Ensuring no one can ever use the computer C) Detecting when, how, and by whom an asset has been damaged D) Giving everyone administrative access
A) Recover your assets B) Forget about the asset C) Buy a cheaper version of the asset D) Blame the network provider
A) The chairs and desks in the office B) The public social media posts of the company C) Intangible creations of the human intellect, like designs or trade secrets D) The physical building of the company
A) Because adversaries are amassing and refining cyber weaponry quickly B) To increase the company's internet speed C) To ensure employees type faster D) Because hackers only attack during the night
A) Only from the internet B) Only from the server room C) Only from physical USB drives D) Inside or outside the corporate network
A) Reduction in security budget B) Increase in competitive advantage C) Faster recovery from hardware failures D) Loss of revenue
A) The process of fixing a broken server B) A type of malware used by internal users C) The act of encrypting a hard drive D) The process of taking legal action
A) Backing up data to a secondary server B) The unauthorized transfer of data from a computer C) Scanning data for viruses D) Deleting data to save space
A) Create a new internet for the company B) Increase the physical size of the monitors C) Compromise internal servers or network infrastructure devices D) Remove the need for a firewall
A) Asset B) Requirement C) Threat D) Mitigation |