Home
1.
Which one of the following objectives is not one of the three main objectives that information security professionals must achieve to protect their organizations against cybersecurity threats?
  • A.
    Integrity
  • B.
    Nonrepudiation
  • C.
    Availability
  • D.
    Confidentiality
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
The three primary objectives of cybersecurity professionals are confidentiality, integrity, and availability.
Report
Name Email  
2.
Tommy is assessing the security of several database servers in his datacenter and realizes that one of them is missing a critical Oracle security patch. What type of situation has Tommy detected?
  • A.
    Risk
  • B.
    Vulnerability
  • C.
    Hacker
  • D.
    Threat
  • Answer & Explanation
  • Report
Answer : [B]
Explanation :
In this scenario, Tommy identified a deficiency in the security of his web server that renders it vulnerable to attack. This is a security vulnerability. Tommy has not yet identified a specific risk because he has not identified a threat (such as a hacker) that might exploit this vulnerability.
Report
Name Email  
3.
Ben is preparing to conduct a cybersecurity risk assessment for his organization. If he chooses to follow the standard process proposed by NIST, which one of the following steps would come first?
  • A.
    Determine likelihood
  • B.
    Determine impact
  • C.
    Identify threats
  • D.
    Identify vulnerabilities
  • Answer & Explanation
  • Report
Answer : [C]
Explanation :
The NIST risk assessment process says that organizations should identify threats before identifying vulnerabilities or determining the likelihood and impact of risks.
Report
Name Email  
4.
Cindy is conducting a cybersecurity risk assessment and is considering the impact that a failure of her city’s power grid might have on the organization. What type of threat is she considering?
  • A.
    Adversarial
  • B.
    Accidental
  • C.
    Structural
  • D.
    Environmental
  • Answer & Explanation
  • Report
Answer : [D]
Explanation :
Widespread infrastructure failures, such as those affecting the power grid or telecommunications circuits, are considered man-made disasters and fall under the category of environmental threats.
Report
Name Email  
5.
Which one of the following categories of threat requires that cybersecurity analysts consider the capability, intent, and targeting of the threat source?
  • A.
    Adversarial
  • B.
    Accidental/li>
  • C.
    Structural
  • D.
    Environmental
  • Answer & Explanation
  • Report
Answer : [A]
Explanation :
Adversarial threat analysis requires examining the capability of the threat source, the intent of the threat source, and the likelihood that the threat will target the organization.
Report
Name Email