Cyber Security Essentials Exam
|Questions and Answers Verified 100%
Correct
The ____ of a piece of information might be derived from the importance of the idea,
or the criticality of the decision, or it can represent simple things like your bank
account number.
A. assessment
B. cost
C. effectiveness
D. value - ANSWER D
A(n) ____ that only reflects the focus and interests of a single field will almost certainly
have exploitable holes in it.
A. control
B. defense
C. mitigation
D. offense - ANSWER B
IT departments install technical countermeasures, but ____ have the responsibility to
deploy accompanying physical security controls.
A. frequently
B. often
C. rarely
D. routinely - ANSWER C
, In most organizations, physical and electronic security involve ____ entirely separate
and independent areas.
A. two
B. three
C. four
D. five - ANSWER A
A reasonably accurate ____ of the important information that the organization
considers valuable and where it is kept is important.
A. hierarchy
B. inventory
C. map
D. survey - ANSWER B
Any workable solution has to be ____.
A. complex
B. detailed
C. elegant
D. practical - ANSWER D
A security infrastructure should reflect the ____ needs of the business as well as its
business requirements.
A. assurance
B. maturation
C. monetary
D. technical - ANSWER A
|Questions and Answers Verified 100%
Correct
The ____ of a piece of information might be derived from the importance of the idea,
or the criticality of the decision, or it can represent simple things like your bank
account number.
A. assessment
B. cost
C. effectiveness
D. value - ANSWER D
A(n) ____ that only reflects the focus and interests of a single field will almost certainly
have exploitable holes in it.
A. control
B. defense
C. mitigation
D. offense - ANSWER B
IT departments install technical countermeasures, but ____ have the responsibility to
deploy accompanying physical security controls.
A. frequently
B. often
C. rarely
D. routinely - ANSWER C
, In most organizations, physical and electronic security involve ____ entirely separate
and independent areas.
A. two
B. three
C. four
D. five - ANSWER A
A reasonably accurate ____ of the important information that the organization
considers valuable and where it is kept is important.
A. hierarchy
B. inventory
C. map
D. survey - ANSWER B
Any workable solution has to be ____.
A. complex
B. detailed
C. elegant
D. practical - ANSWER D
A security infrastructure should reflect the ____ needs of the business as well as its
business requirements.
A. assurance
B. maturation
C. monetary
D. technical - ANSWER A