a. Profiles
b. Implementation tiers
c. Core
d. All of the options mentioned mentioned
The correct answer is: All of the options mentioned mentioned
2. _______________ is the collection of tools, policies, security concepts, guidelines,
technologies, etc. used to protect the cyberspace environment, organization and user’s
assets.
a. Cyberspace
b. Cybersecurity
c. Cybernet
d. Cybercrime
The correct answer is: Cybersecurity
3. _______________ refers to the characteristics of data or information of not being
altered during and after transmission to the intended receiver.
Select one:
a. Integrity
b. Availability
c. Accessibility
d. Non - repudability
The correct answer is: Integrity
,4. Which of the options below is an Information Security Risk Management System
Implementation Guidance?
a. ISO 27002
b. ISO 27001
c. ISO 27014
d. ISO 27005
The correct answer is: ISO 27005
5. Which of the following is NOT part of cybersecurity objectives?
a. Authenticity
b. Availability
c. Integrity
d. Value of Standards
The correct answer is: Value of Standards
6. _______________ is a standard of the PCI Security Standards Council that provides
guidance for maintaining payment security
a. PCI
b. CDE
c. PCI DSS
d. DSS
Feedback
The correct answer is: PCI DSS
7. Which of the following is NOT a part of the component of an Information Security model?
a. Confidentiality.
b. Availability.
c. Accountability.
d. Integrity.
The correct answer is: Accountability.
, 8. The characteristics of a system or a system resource being accessible or usable or
operational upon demand can be defined as _______________
a. Availability
b. Accountability
c. Authenticity
d. Integrity
Feedback
The correct answer is: Availability
9. Which of the following defines the task for Business managers?
a. Responsible for developing policy and implementing sound information security
governance.
b. Responsible for designing, planning, developing, deploying, and maintaining key business
applications.
c. Responsible for ensuring that critical business applications, processes, and local
environments are effectively managed and controlled.
d. Responsible for promoting or implementing an information security assurance program.
The correct answer is: Responsible for ensuring that critical business applications,
processes, and local environments are effectively managed and controlled.
10. _______________ is a set of documents published by ISACA, engaged in the
development, adoption, and use of globally accepted, industry-leading knowledge and
practices for information systems.
a. All of the options mentioned
b. Cobit
c. ITIL Foundation
d. Cobit 5
The correct answer is: Cobit