Deck 3: Cybersecurity Framework

ملء الشاشة (f)
exit full mode
سؤال
Which of the following is a network of the national standards institutes of more than 160 countries?

A) ISO
B) NIST
C) FIPS
D) IEC
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Which of the following is the official publication series for NIST standards and guidelines?

A) ITL bulletins
B) FIPS
C) Special Publication 800 series
D) NIST Internal or Interagency reports
سؤال
Which of the following key information security principles traces actions to their source?

A) Accountability
B) Assurance
C) Authorization
D) Accounting
سؤال
Which of the following key information security principles grants users and systems a predetermined level of access to information resources?

A) Assurance
B) Authentication
C) Authorization
D) Accountability
سؤال
Which of the following is a behavioral control that can be used to safeguard against the loss of integrity?

A) Rotation of duties
B) Log analysis
C) Code testing
D) Digital signatures
سؤال
Which of the following is a monitoring control that safeguards against the loss of integrity?

A) File integrity monitoring
B) Separation of duties
C) Encryption
D) Digital signatures
سؤال
Which of the following are the three elements of the CIA triad?

A) Authentication, integrity, confidentiality
B) Availability, integrity, confidentiality
C) Access, integrity, confidentiality
D) Authorization, integrity, confidentiality
سؤال
Which of the following refers to a computer used in a DDoS attack?

A) Botnet
B) Victim
C) Bot
D) Handler
سؤال
Which of the following statements best describes NIST?

A) A regulatory government organization that enforces standards
B) A coalition of over 160 countries that creates standards
C) A nonregulatory federal agency that develops and promotes standards
D) A nongovernment organization that develops and promotes standards
سؤال
Which of the following best describes the accounting key information security principle?

A) The logging of access and usage of information resources
B) The configuring of the Security log to record events
C) The process of tracing actions to their source
D) The process of identifying users who seek access to secure information
سؤال
Which of the following best describes the accountability key information security principle?

A) The logging of access and usage of information resources
B) The configuring of the Security log to record events
C) The process of tracing actions to their source
D) The process of identifying users who seek access to secure information
سؤال
Which of the following can achieve authentication in information security?

A) Intrusion detection systems
B) Log files
C) Auditing
D) Tokens
سؤال
Which of the following refers to the requirement that private or confidential information not be disclosed to unauthorized individuals?

A) Availability
B) Confidentiality
C) Integrity
D) Control
سؤال
Which of the following is an example of a security mechanism designed to preserve confidentiality?

A) Controlled traffic routing
B) Logical and physical access controls
C) Database views
D) All of the above
سؤال
CVSS is short for which of the following?

A) Confidential Vulnerability Secure System
B) Common Vulnerability Secure System
C) Common Vulnerability Scoring System
D) Confidential Vulnerability Scoring System
سؤال
Which of the following is not one of the "Five A's" of information security?

A) Availability
B) Assurance
C) Authorization
D) Authentication
سؤال
Which of the following is a collective term given to guidance on topics related to information systems security, predominantly regarding the planning, implementing, managing, and auditing of overall information security practices?

A) Service level agreements
B) Security framework
C) "Five A's" of information security
D) CIA security model
سؤال
The ISO 27002 standard has its origins in which of the following countries?

A) France
B) United States
C) Germany
D) Great Britain
سؤال
Which of the following NIST publications focuses on cybersecurity practices and guidelines?

A) Special Publication 1800 series
B) FIPS
C) ITL bulletins
D) NIST Internal or Interagency reports
سؤال
Which of the following refers to those responsible for implementing, maintaining, and monitoring safeguards and systems?

A) Network engineers
B) System administrators
C) Webmasters
D) All of the above
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/20
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 3: Cybersecurity Framework
1
Which of the following is a network of the national standards institutes of more than 160 countries?

A) ISO
B) NIST
C) FIPS
D) IEC
ISO
2
Which of the following is the official publication series for NIST standards and guidelines?

A) ITL bulletins
B) FIPS
C) Special Publication 800 series
D) NIST Internal or Interagency reports
FIPS
3
Which of the following key information security principles traces actions to their source?

A) Accountability
B) Assurance
C) Authorization
D) Accounting
Accountability
4
Which of the following key information security principles grants users and systems a predetermined level of access to information resources?

A) Assurance
B) Authentication
C) Authorization
D) Accountability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
5
Which of the following is a behavioral control that can be used to safeguard against the loss of integrity?

A) Rotation of duties
B) Log analysis
C) Code testing
D) Digital signatures
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
6
Which of the following is a monitoring control that safeguards against the loss of integrity?

A) File integrity monitoring
B) Separation of duties
C) Encryption
D) Digital signatures
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
7
Which of the following are the three elements of the CIA triad?

A) Authentication, integrity, confidentiality
B) Availability, integrity, confidentiality
C) Access, integrity, confidentiality
D) Authorization, integrity, confidentiality
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following refers to a computer used in a DDoS attack?

A) Botnet
B) Victim
C) Bot
D) Handler
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which of the following statements best describes NIST?

A) A regulatory government organization that enforces standards
B) A coalition of over 160 countries that creates standards
C) A nonregulatory federal agency that develops and promotes standards
D) A nongovernment organization that develops and promotes standards
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following best describes the accounting key information security principle?

A) The logging of access and usage of information resources
B) The configuring of the Security log to record events
C) The process of tracing actions to their source
D) The process of identifying users who seek access to secure information
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
11
Which of the following best describes the accountability key information security principle?

A) The logging of access and usage of information resources
B) The configuring of the Security log to record events
C) The process of tracing actions to their source
D) The process of identifying users who seek access to secure information
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which of the following can achieve authentication in information security?

A) Intrusion detection systems
B) Log files
C) Auditing
D) Tokens
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which of the following refers to the requirement that private or confidential information not be disclosed to unauthorized individuals?

A) Availability
B) Confidentiality
C) Integrity
D) Control
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
14
Which of the following is an example of a security mechanism designed to preserve confidentiality?

A) Controlled traffic routing
B) Logical and physical access controls
C) Database views
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
15
CVSS is short for which of the following?

A) Confidential Vulnerability Secure System
B) Common Vulnerability Secure System
C) Common Vulnerability Scoring System
D) Confidential Vulnerability Scoring System
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
16
Which of the following is not one of the "Five A's" of information security?

A) Availability
B) Assurance
C) Authorization
D) Authentication
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
17
Which of the following is a collective term given to guidance on topics related to information systems security, predominantly regarding the planning, implementing, managing, and auditing of overall information security practices?

A) Service level agreements
B) Security framework
C) "Five A's" of information security
D) CIA security model
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
18
The ISO 27002 standard has its origins in which of the following countries?

A) France
B) United States
C) Germany
D) Great Britain
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of the following NIST publications focuses on cybersecurity practices and guidelines?

A) Special Publication 1800 series
B) FIPS
C) ITL bulletins
D) NIST Internal or Interagency reports
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which of the following refers to those responsible for implementing, maintaining, and monitoring safeguards and systems?

A) Network engineers
B) System administrators
C) Webmasters
D) All of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 20 في هذه المجموعة.