100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

Test Bank for Management of Cybersecurity, 7th Edition by Michael E. Whitman

Beoordeling
-
Verkocht
1
Pagina's
109
Cijfer
A+
Geüpload op
09-03-2025
Geschreven in
2024/2025

Test Bank for Management of Cybersecurity, 7e 7th Edition by Michael E. Whitman, Herbert J. Mattord. All chapters (Chap 1 to 12) test bank are included with answers. 1. Introduction to the Management of Cybersecurity. 2. Governance and Strategic Planning for Cybersecurity. 3. Risk Management: Assessing Risk. 4. Risk Management: Treating Risk. 5. Compliance: Law and Ethics. 6. Cybersecurity Policy 5R 6 8. 7. Developing the Cybersecurity Program. 8. Cybersecurity Management Models. 9. Cybersecurity Management Practices. 10. Planning for Contingencies. 11. Cybersecurity Maintenance. 12. Cybersecurity Protection Mechanisms.

Meer zien Lees minder
Instelling
CyberSecurity Certified
Vak
CyberSecurity Certified











Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
CyberSecurity Certified
Vak
CyberSecurity Certified

Documentinformatie

Geüpload op
9 maart 2025
Aantal pagina's
109
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

Chap 01 7e - Whitman

Indicate the answer choice that best completes the statement or answers the question.
1. Which of the following represents a potential risk to an information asset?

a. hacker
b. vulnerability
c. attack
d. threat

ANSWER: d

2. Philip was tasked by Sam, the CISO, to review all the security guidelines within the organization to make sure
they are up to date with current industry standards. Which of the "the six Ps" does Philip's work fall into?

a. planning
b. policy
c. programs
d. protection

ANSWER: b

3. Mary is configuring user access controls in Microsoft Active Directory to ensure that only authorized personnel
can access sensitive data. Which specific action should Mary take to address the appropriate CIA triad
attribute of confidentiality?

a. Set up user permissions to limit access to confidential files.
b. Schedule regular backups to ensure data recovery.
c. Implement checksums to verify data accuracy.
d. Enable logging to track user activities.

ANSWER: a

4. What category of threat would fit the examples of malware, website spoofing, or denial of service?

a. theft
b. technological obsolescence
c. cryptography
d. software attacks

ANSWER: d




Page 1

,Name: Class: Date:

Chap 01 7e - Whitman

5. As a member of the cybersecurity management team, Tammy is tasked to resolve the potential conflicts
between them and the IT management team. How should Tammy address the potential conflicts to ensure
effective information processing and secure operations?

a. Tammy should implement additional security measures to slow down information processing.
b. Tammy should prioritize the cybersecurity management team goals to maintain secure operations.
c. Tammy should facilitate meetings between the two teams to align their goals and resolve any conflicts.
d. Tammy should delegate the responsibility of resolving conflicts to the Chief Information Officer (CIO)
alone.
ANSWER: c

6. Jack's Pizza is a chain restaurant located in 13 states. They have hired a CISO called Max to handle the
cybersecurity operations of all the pizza chains. Max brings all his staff together to discuss the overall
organization's strategy for cybersecurity. He solicits all their input and creates a strategy from the dialogue he
had with his team. What type of leader would Max be considered?

a. influencer
b. democratic
c. laissez-faire
d. autocratic

ANSWER: b

7. Tom is tasked with ensuring that the company's database remains available to users even during a hardware
failure. Which of the following actions should Tom take to achieve this, focusing on the appropriate CIA triad
attribute of availability?

a. Encrypt the database to prevent unauthorized access.
b. Implement RAID (Redundant Array of Independent Disks) to protect against data loss.
c. Apply checksums and hashing algorithms to verify data integrity.
d. Set up multi-factor authentication for accessing the database.

ANSWER: b




Page 2

,Name: Class: Date:

Chap 01 7e - Whitman

8. What is the management theory that uses core principles of planning, organizing, staffing, and controlling?

a. traditional management theory
b. popular management theory
c. modern management theory
d. ancient management theory

ANSWER: a

9. Which is not a category of threats that represent a clear and present danger to an organization's people,
information, and systems?

a. theft
b. technological obsolescence
c. cryptography
d. software attacks

ANSWER: c

10. Suzanne was tasked by Sally, the CISO, to develop strategies for the next five years to ensure confidentiality,
integrity, and availability of information for the organization. Which of the "the six Ps" does Suzanne's work fall
into?

a. planning
b. policy
c. programs
d. protection

ANSWER: a

11. What is the management theory that uses core principles of planning, organizing, leading, and controlling?

a. traditional management theory
b. popular management theory
c. modern management theory
d. new age management theory

ANSWER: b




Page 3

, Name: Class: Date:

Chap 01 7e - Whitman

12. Which characteristic of the CIA triad should you prioritize when implementing a backup system to recover
data in the event of a disaster?

a. confidentiality
b. integrity
c. availability
d. authentication

ANSWER: c

13. What characteristic of the CIA triad is concerned with ensuring the data is accurate and valid?

a. confidentiality
b. integrity
c. availability
d. authenticity

ANSWER: b

14. Susie is a manager at Lisco, a pharmaceutical company in charge of cybersecurity for the organization. She has
been tasked by Julie, her boss, to create a strategy for the next five year period based on what she
accomplished the previous few years. Which of the following phases is Suzie using?

a. planning
b. organizing
c. leading
d. controlling

ANSWER: a

15. The company has recently implemented a security policy that requires all data to be incrementally backed up
daily with full backups weekly. Analyze the policy and determine which characteristic of the CIA triad it best
exemplifies, explaining your reasoning.

a. confidentiality, because it protects data from unauthorized access
b. integrity, because it ensures data remains accurate and unaltered
c. availability, because it ensures data can be restored and accessed even after a disaster
d. non-repudiation, because it ensures that actions can be tracked and verified

ANSWER: c




Page 4

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Tutor247 Boston University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
5990
Lid sinds
3 jaar
Aantal volgers
3557
Documenten
1104
Laatst verkocht
2 uur geleden
Tutor 24/7

Providing best and accurate study guidance to students since 2011. Swift response to our students 24/7 and Seven days a week. At your service :)

4,1

733 beoordelingen

5
440
4
120
3
72
2
30
1
71

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen