Chapter 1 Exam/ Questions with Certified
Solutions.
Terms in this set (19)
Matt is updating the Managerial
organization's threat
assessment process. What
category of control is Matt
implanting?
Compliance
Jade's organization recently
suffered a security breach
that affected stored credit
card data. Jade's primary
concern is the fact that the
organization is subject to
sanctions for violating the
provisions of the Payment
Card industry Data security
standard. What category of
risk is concerning Jade?
, Chris is responding to a Integrity
security incident that
compromised one of his
organization's web servers.
He believes that the
attackers defaced on or more
pages on the website. What
cybersecurity objective did
this attack violate?
Tonya is concerned about the Deterrent
risk that an attacker will
attempt to gain access to her
organization's database
server. She is searching for a
control that would
discourage the attacker from
attempting to gain access.
What type of security control
is she seeking to implement?
Greg is implementing a data Network-Based
loss prevention system. He
would like to ensure that it
protects against
transmissions of sensitive
information by guests on his
wireless network. What DLP
technology would best meet
this goal?
Solutions.
Terms in this set (19)
Matt is updating the Managerial
organization's threat
assessment process. What
category of control is Matt
implanting?
Compliance
Jade's organization recently
suffered a security breach
that affected stored credit
card data. Jade's primary
concern is the fact that the
organization is subject to
sanctions for violating the
provisions of the Payment
Card industry Data security
standard. What category of
risk is concerning Jade?
, Chris is responding to a Integrity
security incident that
compromised one of his
organization's web servers.
He believes that the
attackers defaced on or more
pages on the website. What
cybersecurity objective did
this attack violate?
Tonya is concerned about the Deterrent
risk that an attacker will
attempt to gain access to her
organization's database
server. She is searching for a
control that would
discourage the attacker from
attempting to gain access.
What type of security control
is she seeking to implement?
Greg is implementing a data Network-Based
loss prevention system. He
would like to ensure that it
protects against
transmissions of sensitive
information by guests on his
wireless network. What DLP
technology would best meet
this goal?