Not answered
Marked out of 1.00
Flag question
Question text
The PCI-DSS provides guidance for _______________
Select one:
a. Security of Computer Architecture.
b. Maintaining payment Security.
c. Security of PCI Interfaces.
d. Maintaining Computer Security.
Feedback
The correct answer is: Maintaining payment Security.
Question 2
Not answered
Marked out of 1.00
Flag question
Question text
_______________ is a standard of the PCI Security Standards Council that provides guidance for
maintaining payment security
Select one:
a. PCI
b. DSS
c. PCI DSS
d. CDE
Feedback
The correct answer is: PCI DSS
Question 3
,Not answered
Marked out of 1.00
Flag question
Question text
Who is responsible for developing policy and implementing sound information security governance
and information security assurance?
Select one:
a. The Chief Information Security Officer.
b. The Security Officer.
c. The I.T Manager.
d. The Chief Executive Officer.
Feedback
The correct answer is: The Chief Information Security Officer.
Question 4
Not answered
Marked out of 1.00
Flag question
Question text
Risk can be defined as _______________
Select one:
a. collection of tools, policies, security concepts, security safeguards that are used to protect the
cyberspace environment and organization and user’s assets.
b. data contained in an information system or a service provided by a system or a system capability
or a facility that houses system operations and equipment.
c. artifacts based on or dependent on computer and communications technology the
interconnections among these various elements.
d. a measure of the extent to which an entity is threatened by a potential circumstance or event.
Feedback
, The correct answer is: a measure of the extent to which an entity is threatened by a potential
circumstance or event.
Question 5
Not answered
Marked out of 1.00
Flag question
Question text
Which one of the following is NOT an essential Cyber-Security objective?
Select one:
a. Confidentiality.
b. Referentiality.
c. Availability.
d. Accountability.
Feedback
The correct answer is: Referentiality.
Question 6
Not answered
Marked out of 1.00
Flag question
Question text
What is Vulnerability in Cyber-Security?
Select one:
a. The property of a system or system resource ensuring that the actions of a system entity may be
traced uniquely to that entity.
b. A potential for violation of security that exists.
c. Assurance that the sender of information is provided with proof of delivery.
d. A flaw or weakness in a system’s design, implementation, or operation and management.
Feedback