Certificate Questions with
Accurate Answers
A data breach is an example of a: correct answer A. Vulnerability
B. Threat event (Answer)
C. Threat actor
D. Risk
A security incident and event management (SIEM) system should do which of the
following? (Select all that apply) correct answer A. Capture security events
B. Analyze security events (Answer)
C. Alert based on anomalies (Answer)
D. Alert based on threshold and correlation analysis (Answer)
A set of performance measures organized into four categories describes a: correct
answer A. Balanced scorecard. (Answer)
B. Capability maturity model integration.
C. COBIT 5.
D. ISO 27004:2009.
Configuration Management needs to cover what technology used by an
organization? correct answer Infrastructure components, like:
- Virtualization infrastructure
- Operating systems
, - Web / application server engines
- Database management systems
- Infrastructure services (e.g., mail, file sharing environments)
- Security Services (e.g., Active Directory)
Network components, like:
- Firewall; routers; switches
Client endpoints
IoT technology
Cybersecurity controls are related to which of the following network
environments? correct answer A. The Internet network
B. Internet network
C. Wireless networks
D. Business partner connections
E. All of the above (Answer)
Cybersecurity is focused on protection of information assets from loss of: correct
answer A. Confidentiality
B. Integrity
C. Availability
D. All of the above (Answer)
During the security evaluation of a cloud service provider, an organization wants
an independent perspective on the effectiveness of the provider's control
environment. Which of the following would be the BEST option for the
organization to use? correct answer A. BITS Shared Assessment Program