Cybersecurity Management Solved Exam Questions - 706 Verified Questions

Page 1


Cybersecurity Management Solved

Exam Questions

Course Introduction

Cybersecurity Management explores the principles, frameworks, and best practices necessary to protect organizational information assets in a rapidly evolving digital landscape. The course covers key topics such as risk assessment, policy development, security governance, incident response, compliance with legal and regulatory standards, and security awareness training. Students gain a comprehensive understanding of how to design, implement, and evaluate security strategies that align with business objectives, with a focus on leadership roles and decision-making in the context of organizational cybersecurity. Through case studies and real-world scenarios, learners develop the skills needed to manage cybersecurity initiatives, communicate effectively with stakeholders, and foster a strong security culture within organizations.

Recommended Textbook

Management of Information Security 5th Edition by Michael E. Whitman

Available Study Resources on Quizplus

12 Chapters

706 Verified Questions

706 Flashcards

Source URL: https://quizplus.com/study-set/2555

Page 2

Chapter 1: Introduction to the Management of Information Security

Available Study Resources on Quizplus for this Chatper

63 Verified Questions

63 Flashcards

Source URL: https://quizplus.com/quiz/50835

Sample Questions

Q1) ESD is the acronym for ____________________ discharge.

Answer: electrostatic

Q2) What do audit logs that track user activity on an information system provide?

A) identification

B) authorization

C) accountability

D) authentication

Answer: C

Q3) The three levels of planning are strategic planning,tactical planning,and ____________________ planning.

Answer: operational

Q4) The application of computing and network resources to try every possible combination of options of a password is called a dictionary attack.

A)True

B)False

Answer: False

Q5) The set of organizational guidelines that dictates certain behavior within the organization is called ____________________.

Answer: policy

To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Compliance: Law and Ethics

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/50836

Sample Questions

Q1) An organization increases its _____________ if it refuses to take measures-due care-to make sure that every employee knows what is acceptable and what is not,and the consequences of illegal or unethical actions.

Answer: liability

Q2) Which ethical standard is based on the notion that life in community yields a positive outcome for the individual,requiring each individual to contribute to that community?

A) utilitarian

B) virtue

C) fairness or justice

D) common good

Answer: D

Q3) Which of the following is compensation for a wrong committed by an employee acting with or without authorization?

A) liability

B) restitution

C) due diligence

D) jurisdiction

Answer: B

To view all questions and flashcards with answers, click on the resource link above.

Page 4

Chapter 3: Governance and Strategic Planning for Security

Available Study Resources on Quizplus for this Chatper

52 Verified Questions

52 Flashcards

Source URL: https://quizplus.com/quiz/50837

Sample Questions

Q1) A person or organization that has a vested interest in a particular aspect of the planning or operation of the organization is a stockbroker.

A)True

B)False

Answer: False

Q2) According to the Corporate Governance Task Force (CGTF),which phase in the IDEAL model and framework lays the groundwork for a successful improvement effort?

A) Initiating

B) Establishing

C) Acting

D) Learning

Answer: A

Q3) Describe the key approaches organizations are using to achieve unified Enterprise Risk Management.

Answer: Combining physical security and InfoSec under one leader as one business functionUsing separate business functions that report to a common senior executiveUsing a risk council approach to provide a collaborative approach to risk management

To view all questions and flashcards with answers, click on the resource link above.

Chapter 4: Information Security Policy

Available Study Resources on Quizplus for this Chatper

56 Verified Questions

56 Flashcards

Source URL: https://quizplus.com/quiz/50838

Sample Questions

Q1) Information security policies are designed to provide structure in the workplace and explain the will of the organization's management.

A)True

B)False

Q2) What are the four elements that an EISP document should include?

Q3) What are the two general methods for implementing technical controls?

A) profile lists and configuration filters

B) firewall rules and access filters

C) user profiles and filters

D) access control lists and configuration rules

Q4) When an organization demonstrates that it is continuously attempting to meet the requirements of the market in which it operates,what is it ensuring?

A) policy administration

B) due diligence

C) adequate security measures

D) certification and accreditation

Q5) The three types of information security policies include the enterprise information security policy,the issue-specific security policy,and the ____________________ security policy.

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Developing the Security Program

Available Study Resources on Quizplus for this Chatper

65 Verified Questions

65 Flashcards

Source URL: https://quizplus.com/quiz/50839

Sample Questions

Q1) In larger organizations,responsible for some aspect of information security; in smaller organizations,this title may be assigned to the only or senior security administrator.

A) InfoSec program

B) SETA

C) scope creep

D) security watchstander

E) security manager

F) CISO

G) projectitis

H) critical path method

I) security technicians

J) security awareness program

Q2) Which of the following is an advantage of the user support group form of training?

A) Usually conducted in an informal social setting

B) Formal training plan

C) Can be live, or can be archived and viewed at the trainee's convenience

D) Can be customized to the needs of the trainee

Q3) What is the Chief Information Security Office primarily responsible for?

To view all questions and flashcards with answers, click on the resource link above.

Chapter 6: Risk Management: Identifying and Assessing Risk

Available Study Resources on Quizplus for this Chatper

60 Verified Questions

60 Flashcards

Source URL: https://quizplus.com/quiz/50840

Sample Questions

Q1) Which of the following is an example of a technological obsolescence threat?

A) Hardware equipment failure

B) Unauthorized access

C) Outdated servers

D) Malware

Q2) What does it mean to 'know the enemy' with respect to risk management?

Q3) What should you be armed with to adequately assess potential weaknesses in each information asset?

A) Properly classified inventory

B) Audited accounting spreadsheet

C) Intellectual property assessment

D) List of known threats

Q4) Discuss the trends in frequency of attacks and how that plays into a risk management strategy.

Q5) Which of the following is an attribute of a network device is physically tied to the network interface?

A) Serial number

B) MAC address

C) IP address

D) Model number

Page 8

To view all questions and flashcards with answers, click on the resource link above.

Chapter 7: Risk Management: Controlling Risk

Available Study Resources on Quizplus for this Chatper

60 Verified Questions

60 Flashcards

Source URL: https://quizplus.com/quiz/50841

Sample Questions

Q1) The calculated value associated with the most likely loss from a single attack.

A) defense risk control strategy

B) mitigation risk control strategy

C) acceptance risk control strategy

D) termination risk control strategy

E) risk appetite

F) cost-benefit analysis

G) cost avoidance

H) asset valuation

I) organizational feasibility

J) single loss expectancy

Q2) Discuss three alternatives to feasibility analysis.

Q3) Which of the following determines acceptable practices based on consensus and relationships among the communities of interest.

A) organizational feasibility

B) political feasibility

C) technical feasibility

D) operational feasibility

Q4) What are the four stages of a basic FAIR analysis?

Q5) What is the OCTAVE method approach to risk management?

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Security Management Models

Available Study Resources on Quizplus for this Chatper

60 Verified Questions

60 Flashcards

Source URL: https://quizplus.com/quiz/50842

Sample Questions

Q1) Which of the following specifies the authorization classification of information asset an individual user is permitted to access,subject to the need-to-know principle?

A) Discretionary access controls

B) Task-based access controls

C) Security clearances

D) Sensitivity levels

Q2) ISO/IEC 27001 provides implementation details on how to implement ISO/IEC 27002 and how to set up a(n)____________________.

Q3) Dumpster delving is an information attack that involves searching through a target organization's trash and recycling bins for sensitive information.

A)True

B)False

Q4) Which piece of the Trusted Computing Base's security system manages access controls?

A) trusted computing base

B) reference monitor

C) covert channel

D) verification module

To view all questions and flashcards with answers, click on the resource link above.

Chapter 9: Security Management Practices

Available Study Resources on Quizplus for this Chatper

59 Verified Questions

59 Flashcards

Source URL: https://quizplus.com/quiz/50843

Sample Questions

Q1) When choosing from among recommended practices,an organization should consider a number of questions. List four.

Q2) What are the legal requirements that an organization adopt a standard based on what a prudent organization should do,and then maintain that standard?

A) Certification and accreditation

B) Best practices

C) Due care and due diligence

D) Baselining and benchmarking

Q3) Problems with benchmarking include all but which of the following?

A) Organizations don't often share information on successful attacks

B) Organizations being benchmarked are seldom identical

C) Recommended practices change and evolve, thus past performance is no indicator of future success

D) Benchmarking doesn't help in determining the desired outcome of the security process

Q4) Why must you do more than simply list the InfoSec measurements collected when reporting them?  Explain.

Q5) Describe the three tier approach of the RMF as defined by NIST SP 800-37.

Q6) Compare and contrast accreditation and certification.

Page 11

To view all questions and flashcards with answers, click on the resource link above.

Chapter 10: Planning for Contingencies

Available Study Resources on Quizplus for this Chatper

60 Verified Questions

60 Flashcards

Source URL: https://quizplus.com/quiz/50844

Sample Questions

Q1) In which contingency plan testing strategy do individuals follow each and every IR/DR/BC procedure,including the interruption of service,restoration of data from backups,and notification of appropriate individuals?

A) Desk check

B) Simulation

C) Structured walk-through

D) Full-interruption

Q2) A(n)____________________ is a document containing contact information of the individuals to notify in the event of an actual incident.

Q3) Which of the following has the main goal of restoring normal modes of operation with minimal cost and disruption to normal business activities after an adverse event?

A) Risk management

B) Contingency planning

C) Business response

D) Disaster readiness

Q4) What are the major components of contingency planning?

Q5) There are six key elements that the CP team must build into the DR Plan. What are three of them?

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Personnel and Security

Available Study Resources on Quizplus for this Chatper

60 Verified Questions

60 Flashcards

Source URL: https://quizplus.com/quiz/50845

Sample Questions

Q1) Briefly describe the classifications of InfoSec positions as defined by Schwartz et al.

Q2) A conspiracy or cooperation between two or more individuals or groups to commit illegal or unethical actions is known as racketeering.

A)True

B)False

Q3) Most hiring organizations are aware of the precise value of information security certifications because these programs have been in existence for a long time.

A)True

B)False

Q4) Which of the following policies makes it difficult for an individual to violate InfoSec and is quite useful in monitoring financial affairs?

A) Task rotation

B) Mandatory vacations

C) Separation of duties

D) Job rotation

Q5) Describe the SSCP certification. How does it compare to the CISSP?

Q6) List the six key principles that should shape the career of a CISO.

To view all questions and flashcards with answers, click on the resource link above.

Page 13

Chapter 12: Protection Mechanisms

Available Study Resources on Quizplus for this Chatper

61 Verified Questions

61 Flashcards

Source URL: https://quizplus.com/quiz/50846

Sample Questions

Q1) List the most common firewall implementation architectures.

Q2) The ability to restrict specific services is a common practice in most modern routers,and is invisible to the user.

A)True

B)False

Q3) Was developed by Netscape in 1994 to provide security for online e-commerce transactions.

A) VPN

B) transport mode

C) SSL

D) PKI

E) digital certificate

F) asymmetric encryption

G) Vernam cipher

H) transposition cipher

I) content filter

J) footprinting

Q4) ____________  is a technology in which multiple real,routable external IP addresses are converted to special ranges of internal IP addresses,usually on a one-to-one basis.

Page 14

To view all questions and flashcards with answers, click on the resource link above.

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.