100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Test Bank for Management of Cybersecurity, 7th Edition by Michael E. Whitman

Rating
-
Sold
1
Pages
109
Grade
A+
Uploaded on
09-03-2025
Written in
2024/2025

Test Bank for Management of Cybersecurity, 7e 7th Edition by Michael E. Whitman, Herbert J. Mattord. All chapters (Chap 1 to 12) test bank are included with answers. 1. Introduction to the Management of Cybersecurity. 2. Governance and Strategic Planning for Cybersecurity. 3. Risk Management: Assessing Risk. 4. Risk Management: Treating Risk. 5. Compliance: Law and Ethics. 6. Cybersecurity Policy 5R 6 8. 7. Developing the Cybersecurity Program. 8. Cybersecurity Management Models. 9. Cybersecurity Management Practices. 10. Planning for Contingencies. 11. Cybersecurity Maintenance. 12. Cybersecurity Protection Mechanisms.

Show more Read less
Institution
CyberSecurity Certified
Course
CyberSecurity Certified











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CyberSecurity Certified
Course
CyberSecurity Certified

Document information

Uploaded on
March 9, 2025
Number of pages
109
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Chap 01 7e - Whitman

Indicate the answer choice that best completes the statement or answers the question.
1. Which of the following represents a potential risk to an information asset?

a. hacker
b. vulnerability
c. attack
d. threat

ANSWER: d

2. Philip was tasked by Sam, the CISO, to review all the security guidelines within the organization to make sure
they are up to date with current industry standards. Which of the "the six Ps" does Philip's work fall into?

a. planning
b. policy
c. programs
d. protection

ANSWER: b

3. Mary is configuring user access controls in Microsoft Active Directory to ensure that only authorized personnel
can access sensitive data. Which specific action should Mary take to address the appropriate CIA triad
attribute of confidentiality?

a. Set up user permissions to limit access to confidential files.
b. Schedule regular backups to ensure data recovery.
c. Implement checksums to verify data accuracy.
d. Enable logging to track user activities.

ANSWER: a

4. What category of threat would fit the examples of malware, website spoofing, or denial of service?

a. theft
b. technological obsolescence
c. cryptography
d. software attacks

ANSWER: d




Page 1

,Name: Class: Date:

Chap 01 7e - Whitman

5. As a member of the cybersecurity management team, Tammy is tasked to resolve the potential conflicts
between them and the IT management team. How should Tammy address the potential conflicts to ensure
effective information processing and secure operations?

a. Tammy should implement additional security measures to slow down information processing.
b. Tammy should prioritize the cybersecurity management team goals to maintain secure operations.
c. Tammy should facilitate meetings between the two teams to align their goals and resolve any conflicts.
d. Tammy should delegate the responsibility of resolving conflicts to the Chief Information Officer (CIO)
alone.
ANSWER: c

6. Jack's Pizza is a chain restaurant located in 13 states. They have hired a CISO called Max to handle the
cybersecurity operations of all the pizza chains. Max brings all his staff together to discuss the overall
organization's strategy for cybersecurity. He solicits all their input and creates a strategy from the dialogue he
had with his team. What type of leader would Max be considered?

a. influencer
b. democratic
c. laissez-faire
d. autocratic

ANSWER: b

7. Tom is tasked with ensuring that the company's database remains available to users even during a hardware
failure. Which of the following actions should Tom take to achieve this, focusing on the appropriate CIA triad
attribute of availability?

a. Encrypt the database to prevent unauthorized access.
b. Implement RAID (Redundant Array of Independent Disks) to protect against data loss.
c. Apply checksums and hashing algorithms to verify data integrity.
d. Set up multi-factor authentication for accessing the database.

ANSWER: b




Page 2

,Name: Class: Date:

Chap 01 7e - Whitman

8. What is the management theory that uses core principles of planning, organizing, staffing, and controlling?

a. traditional management theory
b. popular management theory
c. modern management theory
d. ancient management theory

ANSWER: a

9. Which is not a category of threats that represent a clear and present danger to an organization's people,
information, and systems?

a. theft
b. technological obsolescence
c. cryptography
d. software attacks

ANSWER: c

10. Suzanne was tasked by Sally, the CISO, to develop strategies for the next five years to ensure confidentiality,
integrity, and availability of information for the organization. Which of the "the six Ps" does Suzanne's work fall
into?

a. planning
b. policy
c. programs
d. protection

ANSWER: a

11. What is the management theory that uses core principles of planning, organizing, leading, and controlling?

a. traditional management theory
b. popular management theory
c. modern management theory
d. new age management theory

ANSWER: b




Page 3

, Name: Class: Date:

Chap 01 7e - Whitman

12. Which characteristic of the CIA triad should you prioritize when implementing a backup system to recover
data in the event of a disaster?

a. confidentiality
b. integrity
c. availability
d. authentication

ANSWER: c

13. What characteristic of the CIA triad is concerned with ensuring the data is accurate and valid?

a. confidentiality
b. integrity
c. availability
d. authenticity

ANSWER: b

14. Susie is a manager at Lisco, a pharmaceutical company in charge of cybersecurity for the organization. She has
been tasked by Julie, her boss, to create a strategy for the next five year period based on what she
accomplished the previous few years. Which of the following phases is Suzie using?

a. planning
b. organizing
c. leading
d. controlling

ANSWER: a

15. The company has recently implemented a security policy that requires all data to be incrementally backed up
daily with full backups weekly. Analyze the policy and determine which characteristic of the CIA triad it best
exemplifies, explaining your reasoning.

a. confidentiality, because it protects data from unauthorized access
b. integrity, because it ensures data remains accurate and unaltered
c. availability, because it ensures data can be restored and accessed even after a disaster
d. non-repudiation, because it ensures that actions can be tracked and verified

ANSWER: c




Page 4

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Tutor247 Boston University
View profile
Follow You need to be logged in order to follow users or courses
Sold
5990
Member since
3 year
Number of followers
3557
Documents
1104
Last sold
2 hours ago
Tutor 24/7

Providing best and accurate study guidance to students since 2011. Swift response to our students 24/7 and Seven days a week. At your service :)

4.1

733 reviews

5
440
4
120
3
72
2
30
1
71

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions