A) To protect or guard B) Free from care C) Locked and bolted D) Strength in numbers
A) The elimination of all software bugs B) Physical isolation of all servers C) The state of being free from danger D) Maximum speed of network data
A) Vulnerability B) Threat C) Assets D) Mitigation
A) The counter-measure that reduces the likelihood of an attack B) A weakness in a system or design that could be exploited C) A mechanism that takes advantage of a mechanism D) A potential danger to a company's assets
A) A threat is potential danger; an exploit is the mechanism used to take advantage of a vulnerability B) They are identical terms in modern network security C) A threat is a weakness, while an exploit is a dange D) An exploit is the likelihood of an event, while a threat is a counter-measure
A) The process of identifying all assets in an organization B) The act of intentionally leaking data to the outside world C) The likelihood of a threat to exploit a vulnerability D) The counter-measure that reduces the severity of a potential threat
A) Hardware age and Software version B) Number of users and amount of data C) Probability of occurrence and its consequences D) Speed and Cost
A) Integrity B) Availability C) Confidentiality D) Profitability
A) They are using stealth and evasion techniques to hide their activity B) They no longer target critical infrastructure C) They only target individual home users now D) They have stopped using malware entirely
A) The physical location of an attacker B) The final result of a successful security breach C) A software that prevents viruses from entering a system D) A path by which a threat actor can gain access to a server, host, or network
A) External threats are easier to ignore B) Firewalls only block internal traffic C) Internal users have direct access to the building and infrastructure D) Internal users always have better hacking tools
A) Disconnecting a critical network connection and causing an outage B) An automated bot scanning the web for open ports C) A hacker in another country brute-forcing a password D) A global DDoS attack originating from the internet
A) Decreased litigation costs B) Brand damage and loss of reputation C) Automatic system upgrades D) Increased customer trust
A) Unencrypted Devices B) Email/Social Networking C) Hard Copy D) Removable Media
A) Encryption makes the device run slower B) Encrypted devices are easier to lose C) Encryption is only used for internet traffic D) If the data is not encrypted, a thief can retrieve valuable confidential data
A) They automatically encrypt all data they touch B) They consume too much power from the computer C) They are only dangerous if they are empty D) Employees could perform an unauthorized transfer of data to the drive
A) Lamination B) Confidential data should be shredded when no longer required C) Using invisible ink D) Scanning everything into the cloud
A) Too many people having access to the building's cafeteria B) Weak passwords that have been compromised provide easy access to data C) Computers being left on overnight D) Using a keyboard instead of a mouse
A) It is impossible to store confidential data in the cloud B) Sensitive data can be lost if access is compromised due to weak security settings C) The data becomes too heavy for the internet to carry D) Cloud storage only works during the daytime
A) Protecting your assets B) Protecting only your hardware C) Protecting the public internet D) Protecting your competitors
A) Ensuring no one can ever use the computer B) Detecting when, how, and by whom an asset has been damaged C) Deleting data every 24 hours D) Giving everyone administrative access
A) Forget about the asset B) Recover your assets C) Blame the network provider D) Buy a cheaper version of the asset
A) The physical building of the company B) The chairs and desks in the office C) Intangible creations of the human intellect, like designs or trade secrets D) The public social media posts of the company
A) Because adversaries are amassing and refining cyber weaponry quickly B) Because hackers only attack during the night C) To ensure employees type faster D) To increase the company's internet speed
A) Inside or outside the corporate network B) Only from the server room C) Only from physical USB drives D) Only from the internet
A) Loss of revenue B) Increase in competitive advantage C) Reduction in security budget D) Faster recovery from hardware failures
A) The process of fixing a broken server B) The process of taking legal action C) The act of encrypting a hard drive D) A type of malware used by internal users
A) Deleting data to save space B) Backing up data to a secondary server C) Scanning data for viruses D) The unauthorized transfer of data from a computer
A) Create a new internet for the company B) Remove the need for a firewall C) Compromise internal servers or network infrastructure devices D) Increase the physical size of the monitors
A) Threat B) Asset C) Mitigation D) Requirement |