
Lesson 1: Comparing Security Roles and Security Controls
Quiz
•
Computers
•
8th Grade
•
Hard

Toni Barnes
FREE Resource
Enhance your content
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which security related phrase relates to the integrity of data?
Availability
Modification
Confidentiality
Risk
Answer explanation
Any modification is authorized and is stored and transferred as intended when referring to the integrity of data. Integrity is part of the CIA triad.
Availability means that any information is accessible to those authorized to view or modify it. Availability is part of the CIA triad.
Confidentiality means that certain information should only be known to certain people. Confidentiality is part of the CIA triad.
Risk is the likelihood and impact (or consequence) of a threat actor exploiting a vulnerability.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
An engineer looks to implement security measures by following the five functions in the National Institute of Standards and Technology (NIST) Cybersecurity Framework. When documenting the “detect” function, what does the engineer focus on?
Evaluate risks and threats
Install, operate, and decommission assets
Ongoing proactive monitoring
Restoration of systems and data
Answer explanation
Detect refers to performing ongoing proactive monitoring to ensure that controls are effective and capable of protecting against new types of threats.
Identify covers developing security policies and capabilities, and evaluating risks, threats, and vulnerabilities and recommend security controls to mitigate them.
Protect and procure covers the processes to install, operate, and decommission IT hardware and software assets with security as an embedded requirement of every stage of an operations life cycle.
Recovery deals with the implementation of cybersecurity resilience to restore systems and data if other controls are unable to prevent attacks.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
How might the goals of basic network management not align with the goals of security?
Management focuses on confidentiality and availability.
Management focuses on confidentiality over availability.
Management focuses on integrity and confidentiality.
Management focuses on availability over confidentiality.
Answer explanation
Security is increasingly thought of as a dedicated function. The goals of a network manager are not always well-aligned with the goals of security; network management focuses on availability over confidentiality.
System security may be a dedicated business unit with its own management structure. As a result, network management might only concern itself with availability.
The goals of a basic network management are not always well-aligned with the goals of security; network management would not focus on confidentiality, but rather availability.
Network management would encompass the responsibility for systems up-time and availability. Security administrators would focus on integrity and confidentiality.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Any external responsibility for an organization’s security lies mainly with which individuals?
The senior executives
Tech staff
Managers
Public relations
Answer explanation
External responsibility for security (due care or liability) lies mainly with owners or senior executives. It is important to note that all employees share some measure of responsibility.
Technical and specialist staff have the direct responsibility for implementing, maintaining, and monitoring the policy. Security might be made a core competency of systems and network administrators, or there may be dedicated security administrators.
Managers at an organization may have responsibility for a specific domain or unit, such as building control, ICT, or accounting.
Non-technical staff have the responsibility of complying with policy and with any relevant legislation. Public relations is responsible for media communications.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The National Institute of Standards and Technology (NIST) provides a framework that classifies security-related functions. Which description aligns with the "respond" function?
Evaluate risks, threats, and vulnerabilities.
Perform ongoing, proactive monitoring.
Implement resilience to restore systems
Identify, analyze, and eradicate threats.
Answer explanation
The identify function is to develop security policies and capabilities. This function is used to evaluate risks, threats, and vulnerabilities and recommend security controls to mitigate them.
The detect function is to perform ongoing, proactive monitoring to ensure that controls are effective and capable of protecting against new types of threats.
The recover function is to implement cybersecurity resilience to restore systems and data if other controls are unable to prevent attacks.
The respond function is to identify, analyze, contain, and eradicate threats to systems and data security.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A company has an annual contract with an outside firm to perform a security audit on their network. The purpose of the annual audit is to determine if the company is in compliance with their internal directives and policies for security control. Select the broad class of security control that accurately demonstrates the purpose of the audit.
Managerial
Technical
Physical
Compensating
Answer explanation
Managerial is the control that gives oversight of the information system including selection of other security controls. An example of this type of control is regular scans and audits.
Technical control is implemented as a system (hardware, software, or firmware). For example, firewalls, antivirus software, and OS access control models are technical controls. Technical controls may also be described as logical controls.
Physical controls deter access to premises and hardware. Examples include alarms, gateways, and locks.
A compensating control serves as a substitute for a principal control, as recommended by a security standard, and affords the same (or better) level of protection but uses a different methodology or technology.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The _____ requires federal agencies to develop security policies for computer systems that process confidential information.
Sarbanes-Oxley Act (SOX)
Computer Security Act
Federal information Security Management Act (FISMA
Gramm-Leach-Bliley Act (GLBA)
Answer explanation
The Computer Security Act (1987) specifically requires federal agencies to develop security policies for computer systems that process confidential information.
The Sarbanes-Oxley Act (2002) mandates the implementation of risk assessments, internal controls and audit procedures. This act is not for any specific entity.
The Federal Information Security Management Act (2002) governs the security of data processed by federal government agencies. This act requires agencies to implement an information security program.
The Gramm-Leach-Bliley Act (1999) is a United States federal law that requires financial institutions to explain how they share and protect their customers' private information.
Create a free account and access millions of resources
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple

Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?
Similar Resources on Wayground
10 questions
Cyber Security
Quiz
•
8th Grade
10 questions
Quiz
•
8th - 10th Grade
9 questions
Basic cyber security knowledge
Quiz
•
KG - University
8 questions
Day 1-Cybersecurity
Quiz
•
6th - 8th Grade
11 questions
Personal Servers vs. Web Server Providers Video
Quiz
•
8th Grade
15 questions
MDIS STH IT and AI Session 2
Quiz
•
8th Grade
11 questions
Digital Life
Quiz
•
7th - 9th Grade
10 questions
Cybersecurity Fundamentals Week 6 Quiz
Quiz
•
KG - University
Popular Resources on Wayground
20 questions
Brand Labels
Quiz
•
5th - 12th Grade
10 questions
Ice Breaker Trivia: Food from Around the World
Quiz
•
3rd - 12th Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
20 questions
ELA Advisory Review
Quiz
•
7th Grade
15 questions
Subtracting Integers
Quiz
•
7th Grade
22 questions
Adding Integers
Quiz
•
6th Grade
10 questions
Multiplication and Division Unknowns
Quiz
•
3rd Grade
10 questions
Exploring Digital Citizenship Essentials
Interactive video
•
6th - 10th Grade