maintaining payment security
Select one:
a. DSS
b. CDE
c. PCI DSS
d. PCI
Feedback
The correct answer is: PCI DSS
Question 2
Which of the following is NOT part of cybersecurity objectives?
Select one:
a. Value of Standards
b. Availability
c. Integrity
d. Authenticity
Feedback
The correct answer is: Value of Standards
Question 3
Which of the following BEST defines asset?
Select one:
a. A measure of the extent to which an entity is threatened by a potential circumstance or event.
b. A group of employees working in an organisation
c. None of the options mentioned
d. Data contained in an information system or a service provided by a system or a system capability or a
facility that houses system operations and equipment.
Feedback
The correct answer is: Data contained in an information system or a service provided by a system or a
system capability or a facility that houses system operations and equipment.
Question 4
,Which of the following is NOT an NIST cybersecurity framework component?
Select one:
a. Profiles
b. Implementation tiers
c. Core
d. None of the options mentioned
Feedback
The correct answer is: None of the options mentioned
Question 5
_______________ is the collection of tools, policies, security concepts, guidelines, technologies, etc.
used to protect the cyberspace environment, organization and user’s assets.
Select one:
a. Cybercrime
b. Cybersecurity
c. Cybernet
d. Cyberspace
Feedback
The correct answer is: Cybersecurity
Question 6
Which of the options below is an Information Security Risk Management System Implementation
Guidance?
Select one:
a. ISO 27014
b. ISO 27002
c. ISO 27005
d. ISO 27001
Feedback
The correct answer is: ISO 27005
Question 7
, COBIT is a set of documents published by _______________.
Select one:
a. CIS.
b. ISO.
c. ISACA.
d. ICA.
Feedback
The correct answer is: ISACA.
Question 8
Which of the following BEST defines Cyberspaces?
Select one:
a. It is a collection of tools, policies, security concepts, security safeguards that are used to protect the
cyberspace environment and organization and user’s assets.
b. It consists of artifacts based on or dependent on computer and communications technology the
interconnections among these various elements.
c. It is a measure of the extent to which an entity is threatened by a potential circumstance or event.
d. It is data contained in an information system or a service provided by a system or a system capability.
Feedback
The correct answer is: It consists of artifacts based on or dependent on computer and communications
technology the interconnections among these various elements.
Question 9
_______________ refers to the assurance that the sender of an information is provided with proof of
delivery and the recipient is provided with proof of the sender’s identity, so neither can later deny
having processed the information.
Select one:
a. Non-repudiation
b. Confidentiality
c. Risk
d. Authenticity
Feedback