
CK Cyber 2 - LO1.1.D
Authored by Kari Cobb
Information Technology (IT)
10th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is one of the key responsibilities of cybersecurity professionals when handling sensitive information?
Ignoring ethical principles if the information is not legally protected
Following ethical principles established by professional cybersecurity organizations
Sharing sensitive information with trusted colleagues
Storing sensitive information in unsecured locations
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT a characteristic of a proactive cybersecurity professional?
Swift in responding to threats
Thorough in protecting systems
Reactive to cybersecurity incidents
Proactive in identifying potential risks
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the role of the National Institute of Standards and Technology (NIST) in cybersecurity?
To develop software for cybersecurity
To manage, reduce, and communicate cybersecurity risks
To enforce cybersecurity laws
To provide cybersecurity training to individuals
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which phase of the NIST Cybersecurity Framework involves determining the current cybersecurity risk to an organization?
Protect
Detect
Identify
Respond
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
In the NIST Cybersecurity Framework, what is the main goal of the protect phase?
To identify cybersecurity risks
To implement safeguards to prevent or reduce cybersecurity risk
To analyze potential threats
To recover from cybersecurity incidents
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is NOT one of the six iterative phases outlined by the NIST Cybersecurity Framework?
Identify
Protect
Detect
Eliminate
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Why is it important for cybersecurity professionals to be thorough in their approach?
To ensure they can work independently
To guarantee complete elimination of all risks
To effectively protect systems and data from potential threats
To reduce the need for regular system updates
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?