Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What is an incident in cybersecurity?

A.

Any event

B.

Unauthorized access

C.

An exploit

D.

An event that jeopardizes CIA

What is the difference between Business Continuity Planning (BCP) and Disaster Recovery Planning (DRP)?

A.

BCP restores IT systems, DRP maintains business functions

B.

DRP restores IT and communications, BCP maintains critical business functions

C.

They are the same

D.

BCP only applies before disasters

Which of the following is NOT a social engineering technique?

A.

Pretexting

B.

Baiting

C.

Quid pro quo

D.

Double dealing

A measure of the degree to which an organization depends on information or systems to achieve its mission is called:

A.

Availability

B.

Criticality

C.

Authorization

D.

Confidentiality

What doescriticalityrepresent?

A.

Consultation needs

B.

The importance of data or systems to mission success

C.

Availability requirements

D.

All of the above

Which phase of the access control process (AAA) does a user prove his/her identity?

A.

Authentication

B.

Authorization

C.

Identification

D.

Accounting

Firewalls operate at which OSI layers?

A.

Layer 3

B.

Layer 4

C.

Layer 7

D.

All

Load balancing primarily safeguards which CIA triad element?

A.

Confidentiality

B.

Availability

C.

Integrity

D.

All

Ignoring a risk and continuing business operations is known as:

A.

Risk acceptance

B.

Risk mitigation

C.

Risk avoidance

D.

Risk transfer

IDS can be described in terms of what fundamental functional components?

A.

Response

B.

Information sources

C.

Analysis

D.

All of the choices