100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Cyber Security Course Questions and Answers Rated A+ CA$26.69   Add to cart

Exam (elaborations)

Cyber Security Course Questions and Answers Rated A+

 6 views  0 purchase
  • Course
  • Cyber Security
  • Institution
  • Cyber Security

Cyber Security Course Questions and Answers Rated A+ Threats are... ...unwanted actions potentially harming assets. Vulnerabilities are... ...weaknesses in any safeguard for cyber assets. The likelihood of a threat is... ...the possibility that it may arise. The consequence...

[Show more]

Preview 2 out of 11  pages

  • September 17, 2024
  • 11
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • Cyber Security
  • Cyber Security
avatar-seller
Cyber Security Course Questions and
Answers Rated A+

Threats are... - answer...unwanted actions potentially harming assets.

Vulnerabilities are... - answer...weaknesses in any safeguard for cyber assets.

The likelihood of a threat is... - answer...the possibility that it may arise.

The consequence of a threat is... - answer...the worst-case outcome of a threat.

According to NIST 800-50, education is... - answer...any course/material that provides
employees the necessary decision-making and management skills to improve
promotional ability and mobility.

According to NIST 800-50, training is... - answer...any course/material to provide
employees the necessary skills to perform their job functions.

According to NIST 800-50, awareness is... - answer...any orientation brief/material that
informs and reminds employees of their security responsibilities and management's
expectations.

The benefits of Privacy Impact Assessments are... - answer...project compliance with
laws, reflection of community values in designs, reduction of future costs, achievement
of project goals, promotion of awareness, and ERM.

The risks of Privacy Impact Assessments are... - answer...non-compliance with laws,
loss of credibility with impacted entities, reputational damage, additional costs, and
inadequate solutions.

Types of IP and their definitions. - answerTrademark - symbol, word, logo.

Registered trademark - registration with a national authority.

Nice Classification (NCL) - Goods are 1-34, Services 35-45. An international
classification of goods and services.

Patent - exlusive rights to make/sell invention, but must be public.

Copyright - lawful right to control the dissemination of content.

, Trade Secrets - proprietary information that is confidential and protected assuming
owner takes security precautions.

NIST Cybersecurity Framework (CSF) - answerIDENTIFY - PROTECT - DETECT -
RESPOND - RECOVER

Typical roles and responsibilities across an organisation - answerBoard of Directors →
Executive Committee → ISM/CSM → Cyber Security Practitioners → External
Specialists

Cyber Security Triad - answerConfidentiality - only disclose information to those with
appropriate clearance, approval, and NTK

Integrity - info only created, modified, destroyed, or managed through authorised means

Availability - information may be readily accessed

The definitions for Governance, Risk Management & Compliance - answerGovernance:
Management and oversight at the organisational level

Risk management: Process of identifying and managing risk to acceptable levels

Compliance: demonstrating adherence to set of requirements

the difference between risk tolerance and risk appetite - answerRisk tolerance: what an
organisation willing to bear on a case-by-case basis after all treatment options have
been considered and applied

Risk appetite: level of risk that an organisation willing to pursue or retain to meet its
strategic objectives

the logical order of the Risk Management and Process (ISO 31000) - answerContext
establishment → risk identification → risk analysis → risk evaluated → risk treatment →
monitoring and review

identify and list the attributes of cyber attacks - answerOrigin (internal/external), history
(similar threats), capability (skill of attacker), profile (general behaviour), intent
(adversarial/accidental/environmental), motivation (to targe org.), focus (how
determined, what resources)

Types of malicious software, especially APTs, and ransomware - answerAPTs -
conducted by skilled and motivated adversary using variety of different methods, e.g.,
social engineering, theft of sensitive data or IP, technical attacks through software,
persistence

Virus - infection of host file or program

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller julianah420. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for CA$26.69. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

81989 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
CA$26.69
  • (0)
  Add to cart