Gordon's Review: Mod 2 RMF & CSF, Intro to Cybersecurity

Gordon's Review: Mod 2 RMF & CSF, Intro to Cybersecurity

Professional Development

12 Qs

quiz-placeholder

Similar activities

DBMS

DBMS

Professional Development

10 Qs

Ict/cyberterrorism

Ict/cyberterrorism

KG - Professional Development

9 Qs

cybersecurity I

cybersecurity I

Professional Development

14 Qs

CyberSecurity

CyberSecurity

Professional Development

13 Qs

cyberops13

cyberops13

Professional Development

8 Qs

ISMS

ISMS

Professional Development

10 Qs

Cybersecurity Fundamentals

Cybersecurity Fundamentals

Professional Development

15 Qs

Cyber Security Fundamentals

Cyber Security Fundamentals

Professional Development

15 Qs

Gordon's Review: Mod 2 RMF & CSF, Intro to Cybersecurity

Gordon's Review: Mod 2 RMF & CSF, Intro to Cybersecurity

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Gordon Bjorman

Used 3+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image
In the CIA triad, what does "Integrity" address?
Makes information accessible to only authorized persons
Makes sure information is not changed
Makes sure information is accesible when needed
None Of the Above

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

Compliance rules are one of the primary concerns for information & cyber security professionals as existing rules are enforced and new laws are created.

True
False

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

Business Risk is determined by…

information + availability + defense

vulnerability + attacks + remediation

assets + vulnerability + threat

assessment + information + defense

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image
The process used to understand the nature and extent of risk is…
Risk appetite
Control baseline
Risk avoidance
Risk assessment

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

For automobile companies, a microchip shortage could be categorized as what type of risk

Pandemic

Industry

Compliance

Digital

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image
What type of attack gives hackers remote control of a device?
Keylogger
Vishing
Rootkit
Worm

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

Hackers that use their abilities to support an ideological agenda are categorized as…

Nation State Threat Actors

Hacktivists

Unethical Hackers

APT's

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?