Filters
Question type

Study Flashcards

The cost of a data breach in 2018 is estimated to be:


A) between $13 and $18 per record
B) between $43 and 65 per record
C) between $148 and $408 per record
D) between $100 and $1,000 per record
E) between $4,520 and $4,580 per record

Correct Answer

verifed

verified

A challenge question is when you are stopped at the gate and the guard asks who you are.

Correct Answer

verifed

verified

In the Office of Personnel Management's case, the security breach made many people vulnerable to this.


A) Loss of personal property
B) Inaccurate personal data
C) Identity theft
D) Loss of access to personal data
E) Credit card fees

Correct Answer

verifed

verified

System updates and patches provided by system vendors is a best practice known as____________ .

Correct Answer

verifed

verified

cybersecur...

View Answer

Quantify breaches that are caused by stealing a password


A) A very low percentage (somewhere around 1%)
B) A low percentage (around 10%)
C) A moderate percentage (around 25%)
D) A high percentage (around 50%)
E) A very high percentage (around 80%)

Correct Answer

verifed

verified

Included in the five critical elements that are used to raise security in a firm are all of the following EXCEPT:


A) Infrastructure
B) Law enforcement
C) Policies
D) Training
E) Investments

Correct Answer

verifed

verified

Which of the following are the five functions of the NIST Cybersecurity Framework?


A) Identify, communicate, detect, recover, prosecute
B) Communicate, detect, engage, respond, recover
C) Protect, identify, communicate, recover, prosecute
D) Identify, protect, detect, respond, recover
E) Detect, recover, communicate, respond, engage

Correct Answer

verifed

verified

Two factor authentication is when you use two different methods for people trying to use the system. For instance, you can use a password and a challenge question

Correct Answer

verifed

verified

What are the shortcomings of passwords?

Correct Answer

Answered by ExamLex AI

Answered by ExamLex AI

Passwords, while being one of the most c...

View Answer

Who is responsible for developing a cybersecurity culture?


A) IT people
B) IT leaders and business leaders share responsibility
C) Business leaders
D) Consultants
E) Team of consultants and IT people

Correct Answer

verifed

verified

Over time, attackers have not become more sophisticated to be able to attack systems or create viruses.

Correct Answer

verifed

verified

All of the following are part of cybersecurity balanced scorecard EXCEPT:


A) Risk measures
B) People measures
C) Supply chain measures
D) Threat measures
E) Technology measures

Correct Answer

verifed

verified

Showing 41 - 52 of 52

Related Exams

Show Answer