A) To protect or guard B) Strength in numbers C) Free from care D) Locked and bolted
A) The elimination of all software bugs B) The state of being free from danger C) Maximum speed of network data D) Physical isolation of all servers
A) Threat B) Assets C) Vulnerability D) Mitigation
A) A potential danger to a company's assets B) The counter-measure that reduces the likelihood of an attack C) A mechanism that takes advantage of a mechanism D) A weakness in a system or design that could be exploited
A) An exploit is the likelihood of an event, while a threat is a counter-measure B) A threat is potential danger; an exploit is the mechanism used to take advantage of a vulnerability C) They are identical terms in modern network security D) A threat is a weakness, while an exploit is a dange
A) The act of intentionally leaking data to the outside world B) The counter-measure that reduces the severity of a potential threat C) The process of identifying all assets in an organization D) The likelihood of a threat to exploit a vulnerability
A) Speed and Cost B) Probability of occurrence and its consequences C) Number of users and amount of data D) Hardware age and Software version
A) Integrity B) Confidentiality C) Profitability D) Availability
A) They no longer target critical infrastructure B) They have stopped using malware entirely C) They are using stealth and evasion techniques to hide their activity D) They only target individual home users now
A) A software that prevents viruses from entering a system B) The final result of a successful security breach C) The physical location of an attacker D) A path by which a threat actor can gain access to a server, host, or network
A) Internal users always have better hacking tools B) External threats are easier to ignore C) Firewalls only block internal traffic D) Internal users have direct access to the building and infrastructure
A) Disconnecting a critical network connection and causing an outage B) A hacker in another country brute-forcing a password C) A global DDoS attack originating from the internet D) An automated bot scanning the web for open ports
A) Decreased litigation costs B) Increased customer trust C) Brand damage and loss of reputation D) Automatic system upgrades
A) Removable Media B) Email/Social Networking C) Unencrypted Devices D) Hard Copy
A) If the data is not encrypted, a thief can retrieve valuable confidential data B) Encryption makes the device run slower C) Encryption is only used for internet traffic D) Encrypted devices are easier to lose
A) Employees could perform an unauthorized transfer of data to the drive B) They are only dangerous if they are empty C) They automatically encrypt all data they touch D) They consume too much power from the computer
A) Confidential data should be shredded when no longer required B) Using invisible ink C) Lamination D) Scanning everything into the cloud
A) Too many people having access to the building's cafeteria B) Using a keyboard instead of a mouse C) Weak passwords that have been compromised provide easy access to data D) Computers being left on overnight
A) It is impossible to store confidential data in the cloud B) The data becomes too heavy for the internet to carry C) Sensitive data can be lost if access is compromised due to weak security settings D) Cloud storage only works during the daytime
A) Protecting your assets B) Protecting your competitors C) Protecting only your hardware D) Protecting the public internet
A) Ensuring no one can ever use the computer B) Deleting data every 24 hours C) Giving everyone administrative access D) Detecting when, how, and by whom an asset has been damaged
A) Forget about the asset B) Buy a cheaper version of the asset C) Blame the network provider D) Recover your assets
A) The public social media posts of the company B) The chairs and desks in the office C) Intangible creations of the human intellect, like designs or trade secrets D) The physical building of the company
A) To increase the company's internet speed B) To ensure employees type faster C) Because hackers only attack during the night D) Because adversaries are amassing and refining cyber weaponry quickly
A) Inside or outside the corporate network B) Only from the internet C) Only from the server room D) Only from physical USB drives
A) Loss of revenue B) Reduction in security budget C) Increase in competitive advantage D) Faster recovery from hardware failures
A) The process of taking legal action B) The act of encrypting a hard drive C) The process of fixing a broken server D) A type of malware used by internal users
A) The unauthorized transfer of data from a computer B) Scanning data for viruses C) Deleting data to save space D) Backing up data to a secondary server
A) Remove the need for a firewall B) Increase the physical size of the monitors C) Compromise internal servers or network infrastructure devices D) Create a new internet for the company
A) Threat B) Requirement C) Asset D) Mitigation |