Deck 3: Cybersecurity Framework

Full screen (f)
exit full mode
Question
Which of the following is a network of the national standards institutes of more than 160 countries?

A) ISO
B) NIST
C) FIPS
D) IEC
Use Space or
up arrow
down arrow
to flip the card.
Question
Which of the following is the official publication series for NIST standards and guidelines?

A) ITL bulletins
B) FIPS
C) Special Publication 800 series
D) NIST Internal or Interagency reports
Question
Which of the following key information security principles traces actions to their source?

A) Accountability
B) Assurance
C) Authorization
D) Accounting
Question
Which of the following key information security principles grants users and systems a predetermined level of access to information resources?

A) Assurance
B) Authentication
C) Authorization
D) Accountability
Question
Which of the following is a behavioral control that can be used to safeguard against the loss of integrity?

A) Rotation of duties
B) Log analysis
C) Code testing
D) Digital signatures
Question
Which of the following is a monitoring control that safeguards against the loss of integrity?

A) File integrity monitoring
B) Separation of duties
C) Encryption
D) Digital signatures
Question
Which of the following are the three elements of the CIA triad?

A) Authentication, integrity, confidentiality
B) Availability, integrity, confidentiality
C) Access, integrity, confidentiality
D) Authorization, integrity, confidentiality
Question
Which of the following refers to a computer used in a DDoS attack?

A) Botnet
B) Victim
C) Bot
D) Handler
Question
Which of the following statements best describes NIST?

A) A regulatory government organization that enforces standards
B) A coalition of over 160 countries that creates standards
C) A nonregulatory federal agency that develops and promotes standards
D) A nongovernment organization that develops and promotes standards
Question
Which of the following best describes the accounting key information security principle?

A) The logging of access and usage of information resources
B) The configuring of the Security log to record events
C) The process of tracing actions to their source
D) The process of identifying users who seek access to secure information
Question
Which of the following best describes the accountability key information security principle?

A) The logging of access and usage of information resources
B) The configuring of the Security log to record events
C) The process of tracing actions to their source
D) The process of identifying users who seek access to secure information
Question
Which of the following can achieve authentication in information security?

A) Intrusion detection systems
B) Log files
C) Auditing
D) Tokens
Question
Which of the following refers to the requirement that private or confidential information not be disclosed to unauthorized individuals?

A) Availability
B) Confidentiality
C) Integrity
D) Control
Question
Which of the following is an example of a security mechanism designed to preserve confidentiality?

A) Controlled traffic routing
B) Logical and physical access controls
C) Database views
D) All of the above
Question
CVSS is short for which of the following?

A) Confidential Vulnerability Secure System
B) Common Vulnerability Secure System
C) Common Vulnerability Scoring System
D) Confidential Vulnerability Scoring System
Question
Which of the following is not one of the "Five A's" of information security?

A) Availability
B) Assurance
C) Authorization
D) Authentication
Question
Which of the following is a collective term given to guidance on topics related to information systems security, predominantly regarding the planning, implementing, managing, and auditing of overall information security practices?

A) Service level agreements
B) Security framework
C) "Five A's" of information security
D) CIA security model
Question
The ISO 27002 standard has its origins in which of the following countries?

A) France
B) United States
C) Germany
D) Great Britain
Question
Which of the following NIST publications focuses on cybersecurity practices and guidelines?

A) Special Publication 1800 series
B) FIPS
C) ITL bulletins
D) NIST Internal or Interagency reports
Question
Which of the following refers to those responsible for implementing, maintaining, and monitoring safeguards and systems?

A) Network engineers
B) System administrators
C) Webmasters
D) All of the above
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/20
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 3: Cybersecurity Framework
1
Which of the following is a network of the national standards institutes of more than 160 countries?

A) ISO
B) NIST
C) FIPS
D) IEC
ISO
2
Which of the following is the official publication series for NIST standards and guidelines?

A) ITL bulletins
B) FIPS
C) Special Publication 800 series
D) NIST Internal or Interagency reports
FIPS
3
Which of the following key information security principles traces actions to their source?

A) Accountability
B) Assurance
C) Authorization
D) Accounting
Accountability
4
Which of the following key information security principles grants users and systems a predetermined level of access to information resources?

A) Assurance
B) Authentication
C) Authorization
D) Accountability
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following is a behavioral control that can be used to safeguard against the loss of integrity?

A) Rotation of duties
B) Log analysis
C) Code testing
D) Digital signatures
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
6
Which of the following is a monitoring control that safeguards against the loss of integrity?

A) File integrity monitoring
B) Separation of duties
C) Encryption
D) Digital signatures
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
7
Which of the following are the three elements of the CIA triad?

A) Authentication, integrity, confidentiality
B) Availability, integrity, confidentiality
C) Access, integrity, confidentiality
D) Authorization, integrity, confidentiality
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following refers to a computer used in a DDoS attack?

A) Botnet
B) Victim
C) Bot
D) Handler
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following statements best describes NIST?

A) A regulatory government organization that enforces standards
B) A coalition of over 160 countries that creates standards
C) A nonregulatory federal agency that develops and promotes standards
D) A nongovernment organization that develops and promotes standards
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following best describes the accounting key information security principle?

A) The logging of access and usage of information resources
B) The configuring of the Security log to record events
C) The process of tracing actions to their source
D) The process of identifying users who seek access to secure information
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following best describes the accountability key information security principle?

A) The logging of access and usage of information resources
B) The configuring of the Security log to record events
C) The process of tracing actions to their source
D) The process of identifying users who seek access to secure information
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following can achieve authentication in information security?

A) Intrusion detection systems
B) Log files
C) Auditing
D) Tokens
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following refers to the requirement that private or confidential information not be disclosed to unauthorized individuals?

A) Availability
B) Confidentiality
C) Integrity
D) Control
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following is an example of a security mechanism designed to preserve confidentiality?

A) Controlled traffic routing
B) Logical and physical access controls
C) Database views
D) All of the above
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
15
CVSS is short for which of the following?

A) Confidential Vulnerability Secure System
B) Common Vulnerability Secure System
C) Common Vulnerability Scoring System
D) Confidential Vulnerability Scoring System
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following is not one of the "Five A's" of information security?

A) Availability
B) Assurance
C) Authorization
D) Authentication
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
17
Which of the following is a collective term given to guidance on topics related to information systems security, predominantly regarding the planning, implementing, managing, and auditing of overall information security practices?

A) Service level agreements
B) Security framework
C) "Five A's" of information security
D) CIA security model
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
18
The ISO 27002 standard has its origins in which of the following countries?

A) France
B) United States
C) Germany
D) Great Britain
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following NIST publications focuses on cybersecurity practices and guidelines?

A) Special Publication 1800 series
B) FIPS
C) ITL bulletins
D) NIST Internal or Interagency reports
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following refers to those responsible for implementing, maintaining, and monitoring safeguards and systems?

A) Network engineers
B) System administrators
C) Webmasters
D) All of the above
Unlock Deck
Unlock for access to all 20 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 20 flashcards in this deck.