Toggle Navigation
Games
Blog
Class PIN
Join for Free
Sign in
Toggle Navigation
Games
PIN
Join for Free
Blog
Pricing
Contact us
Help center
Sign in
Study
CBS700
0
%
0
0
0
Back
Restart
A company is audited and certified — but suffers a major data breach the following month. Which misconception does this illustrate?
That following one standard means you are fully secure
Oops!
Okay!
The CIS Critical Security Controls are based on what
Real-world attack data and proven defences
Oops!
Okay!
Which standard specifically governs how payment card data must be handled?
PCI DSS
Oops!
Okay!
Which organization publishes the ISO/IEC 27000 family of standards
ISO and IEC jointly
Oops!
Okay!
What is the difference between a standard and a regulation?
Standards are voluntary best practices; regulations are legally mandated
Oops!
Okay!
An attacker intercepts a financial transaction and later denies sending it. Which security objective has been violated?
Non-repudiation
Oops!
Okay!
Which NIST CSF function involves identifying what assets you have and what risks exist?
Identify
Oops!
Okay!
PCI DSS applies to which organizations
Any organization that stores, processes, or transmits cardholder data
Oops!
Okay!
What does NIST stand for
National Institute of Standards and Technology
Oops!
Okay!
ISO 27002 uses which type of language?
"Should" — advisory
Oops!
Okay!
Which NIST CSF function focuses on restoring normal operations after an incident?
Recover
Oops!
Okay!
Which framework organizes cybersecurity around: Identify, Protect, Detect, Respond, Recover?
NIST CSF
Oops!
Okay!
Which is a cybersecurity DILEMMA described in the chapter?
User needs vs. security requirements
Oops!
Okay!
What is "non-repudiation"
Ensuring neither sender nor recipient can deny their involvement
Oops!
Okay!
What is the definition of "availability" in the CIA Triad
The system is accessible and usable upon demand by authorized entities
Oops!
Okay!
What does "risk" mean in cybersecurity terminology
A measure of threat extent based on impact and likelihood
Oops!
Okay!
Which body publishes COBIT
ISACA
Oops!
Okay!
What is the correct definition of a "vulnerability"
A flaw or weakness that could be exploited
Oops!
Okay!
What language does ISO 27001 use, and what does it mean?
"Shall" — mandatory requirements
Oops!
Okay!
Which ISO standard can an organization get CERTIFIED against?
ISO 27001
Oops!
Okay!
What does CIA stand for in cybersecurity
Confidentiality, Integrity, Availability
Oops!
Okay!
Your experience on this site will be improved by allowing cookies.
Allow cookies