D430 - Section 4 -
Knowledge Checks
and Practice Quiz fully
solved & updated
KC: Which term refers to the process of gathering
and analyzing information to support business
decisions? - answer Competitive Intelligence
KC: Which term refers to a security and risk
management process that prevents sensitive
information from getting into the wrong hands? -
answer Operational Security
KC: Which of the following is defined as the
practice of managing the range of intelligence-
gathering activities directed at an organization? -
answer Competitive Counterintelligence
KC: What is the codename for a study conducted to
curtail unauthorized passing of information and is
the symbol of OPSEC today? - answer Purple
Dragon
, KC: What is the correct order in the 5 steps of the
Operations Security Process ? - answer 1)
Identification of critical information;
2) Analysis of threats;
3) Analysis of vulnerabilities;
4) Assessment of risks;
5) Application of countermeasures.
KC: What describes Vulnerability analysis? - answer
The identification of weaknesses that can be used
to cause harm.
KC: What is the weakest link in a security program?
- answer People
KC: Which type of attack is conducted on people to
gather information? - answer Social Engineering
KC: Which type of attack uses malicious social
engineering, such as an email or link that tricks
the victim into sending a forged request to a
server?
Knowledge Checks
and Practice Quiz fully
solved & updated
KC: Which term refers to the process of gathering
and analyzing information to support business
decisions? - answer Competitive Intelligence
KC: Which term refers to a security and risk
management process that prevents sensitive
information from getting into the wrong hands? -
answer Operational Security
KC: Which of the following is defined as the
practice of managing the range of intelligence-
gathering activities directed at an organization? -
answer Competitive Counterintelligence
KC: What is the codename for a study conducted to
curtail unauthorized passing of information and is
the symbol of OPSEC today? - answer Purple
Dragon
, KC: What is the correct order in the 5 steps of the
Operations Security Process ? - answer 1)
Identification of critical information;
2) Analysis of threats;
3) Analysis of vulnerabilities;
4) Assessment of risks;
5) Application of countermeasures.
KC: What describes Vulnerability analysis? - answer
The identification of weaknesses that can be used
to cause harm.
KC: What is the weakest link in a security program?
- answer People
KC: Which type of attack is conducted on people to
gather information? - answer Social Engineering
KC: Which type of attack uses malicious social
engineering, such as an email or link that tricks
the victim into sending a forged request to a
server?