answers
At larger companies, the cybersecurity program is usually the responsibility of a dedicated
executive leader. This could include the - correct answer ✔✔ Chief Technology Officer.
The National Institute of Standards and Technology (NIST) has published Security and Privacy
Controls for Federal Information Systems and Organizations (NIST-800-53). The NIST-800-53
document is divided into - correct answer ✔✔ 18 control families.
Which of the following logical access attacks is a brute-force attack? - correct answer ✔✔ An
attacker forces access to the network by attempting many passwords or phrases until finding
the correct one.
The National Institute of Standards and Technology (NIST) has published Security and Privacy
Controls for Federal Information Systems and Organizations (NIST-800-53). The NIST-800-53
document is divided into 18 control families. One of the control families is Maintenance. What
ID does Maintenance family use? - correct answer ✔✔ MA
The National Institute of Standards and Technology (NIST) Cybersecurity Framework is displayed
below.What is function C? - correct answer ✔✔ Protect
Which of the following is an example of a Denial-of-Service internal control? - correct answer
✔✔ Monitor system resources to determine if sufficient resources exist to prevent effective
attacks
Which of the physical reconnaissance attacks is looking through someone else's physical trash? -
correct answer ✔✔ Dumpster diving
, The National Institute of Standards and Technology (NIST) has published Security and Privacy
Controls for Federal Information Systems and Organizations (NIST-800-53). One of the control
families is Access Control. What ID does Access Control family use? - correct answer ✔✔ AC
Which of the following is an example of Malware internal controls? - correct answer ✔✔
Employ malicious code protection mechanisms at information system entry and exit points.
What type of logical access attack disguises the source identity and impersonates a legitimate
computer on the network? - correct answer ✔✔ IP spoofing
Which of the following logical access attacks describes IP spoofing? - correct answer ✔✔ IP
spoofing is when the attacker disguises their identity and impersonates a legitimate computer
on the network.
What is an urgency red flag? - correct answer ✔✔ Using words like "suspended", "security
concerns," and "immediately"
The National Institute of Standards and Technology (NIST) has published Security and Privacy
Controls for Federal Information Systems and Organizations (NIST-800-53). The NIST-800-53
document is divided into 18 control families. One of the control families is Personal Security.
What ID does Personal Security family use? - correct answer ✔✔ PS
What does a company apply to ensure that systems are running up-to-date security when they
are available? - correct answer ✔✔ Vulnerability scans
The National Institute of Standards and Technology (NIST) has published Security and Privacy
Controls for Federal Information Systems and Organizations (NIST-800-53). The NIST-800-53
document is divided into 18 control families. One of the control families is Configuration
Management. What ID does Configuration Management family use? - correct answer ✔✔ CM