Home
Subjects
Textbook solutions
Create
Study sets, textbooks, questions
Log in
Sign up
Upgrade to remove ads
Only $35.99/year
Chapter 1 Exam
STUDY
Flashcards
Learn
Write
Spell
Test
PLAY
Match
Gravity
Terms in this set (19)
Matt is updating the organization's threat assessment process. What category of control is Matt implanting?
Managerial
Jade's organization recently suffered a security breach that affected stored credit card data. Jade's primary concern is the fact that the organization is subject to sanctions for violating the provisions of the Payment Card industry Data security standard. What category of risk is concerning Jade?
Compliance
Chris is responding to a security incident that compromised one of his organization's web servers. He believes that the attackers defaced on or more pages on the website. What cybersecurity objective did this attack violate?
Integrity
Tonya is concerned about the risk that an attacker will attempt to gain access to her organization's database server. She is searching for a control that would discourage the attacker from attempting to gain access. What type of security control is she seeking to implement?
Deterrent
Greg is implementing a data loss prevention system. He would like to ensure that it protects against transmissions of sensitive information by guests on his wireless network. What DLP technology would best meet this goal?
Network-Based
What term best describes data the is being sent between two systems over a network connection.
Data in Motion
Tina is tuning her organizations intrusion prevention system to prevent false positive alerts. What type of control is Tina implementing?
Technical Control
Which one of the following is not a common goal of a cybersecurity attacker?
Allocation
Tony is reviewing the status of his organization's defense against a breach of their file server. He believes that a compromise of the file server could reveal information that would prevent the company from continuing to do business. What term best describes the risk that Tony is considering?
Strategic
Which one of the following data elements is not commonly associated with identity theft?
Frequent Flyer number
What term best describes an organization's desired security state?
Control Objectives
Lou mounted the sign below on the fence surrounding his organizations datacenter. What control type best describes a picture of "Beware of Dog sign"
Compensating
What technology used mathematical algorithms to render information unreadable to those lacking the required key?
Data Encryption
Greg recently conducted an assessment of his organization's security controls and discovered a potential gap: the organization does not use full-disk encryption on laptops. What type of control gap exists in this case?
Preventive
What compliance regulation most directly affects the operations of a healthcare provider?
HIPAA
Sets found in the same folder
Chap 12 Q/A
20 terms
CYSA+ Chapter 6 Review Questions
20 terms
Chapter 8
33 terms
CYSA+ Chapter 3 Review Questions
20 terms
Other Quizlet sets
Exam 1 Clinical Nutrition
56 terms
MT - Lymphatic Study Guide
16 terms
US History Quiz - 12/14/17
11 terms
microbio connect
22 terms
Related questions
QUESTION
3. In a Server Virtualization scenario, there are three popular approaches: virtual machine model, paravirual machine model and virtualization at the operating system layer. Which one did we use in the hard drive project?
QUESTION
What is CIDR (Classless Interdomain Routing)?
QUESTION
you manage several windows systems. all computers are members of domain. you use an internal website that uses integrated windows authentication. you attempt to connect the website and are promted for authentication
QUESTION
A small Windows database structured the same as a registry file and contains configuration information about how Windows is started.