Gordon's Review: Mod 2 RMF & CSF, Intro to Cybersecurity

Gordon's Review: Mod 2 RMF & CSF, Intro to Cybersecurity

Professional Development

12 Qs

quiz-placeholder

Similar activities

AI Tools

AI Tools

Professional Development

10 Qs

"Education: Risks and Promises of New Information Technologies"

"Education: Risks and Promises of New Information Technologies"

Professional Development

11 Qs

Forcepoint DSPM Knowledge Check

Forcepoint DSPM Knowledge Check

Professional Development

10 Qs

Cyber Security Everything We Need To Know Quiz

Cyber Security Everything We Need To Know Quiz

Professional Development

10 Qs

6.2 Understanding the Roadmap

6.2 Understanding the Roadmap

Professional Development

12 Qs

DECI - Week 13 - round

DECI - Week 13 - round

Professional Development

16 Qs

Module 1. Passive Reconnaissance

Module 1. Passive Reconnaissance

Professional Development

15 Qs

Chapter 8 - Cloud Computing

Chapter 8 - Cloud Computing

Professional Development

15 Qs

Gordon's Review: Mod 2 RMF & CSF, Intro to Cybersecurity

Gordon's Review: Mod 2 RMF & CSF, Intro to Cybersecurity

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Gordon Bjorman

Used 3+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image
In the CIA triad, what does "Integrity" address?
Makes information accessible to only authorized persons
Makes sure information is not changed
Makes sure information is accesible when needed
None Of the Above

2.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

Compliance rules are one of the primary concerns for information & cyber security professionals as existing rules are enforced and new laws are created.

True
False

3.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image

Business Risk is determined by…

information + availability + defense

vulnerability + attacks + remediation

assets + vulnerability + threat

assessment + information + defense

4.

MULTIPLE CHOICE QUESTION

20 sec • 1 pt

Media Image
The process used to understand the nature and extent of risk is…
Risk appetite
Control baseline
Risk avoidance
Risk assessment

5.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

For automobile companies, a microchip shortage could be categorized as what type of risk

Pandemic

Industry

Compliance

Digital

6.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image
What type of attack gives hackers remote control of a device?
Keylogger
Vishing
Rootkit
Worm

7.

MULTIPLE CHOICE QUESTION

10 sec • 1 pt

Media Image

Hackers that use their abilities to support an ideological agenda are categorized as…

Nation State Threat Actors

Hacktivists

Unethical Hackers

APT's

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?