Professional Documents
Culture Documents
- Redundancy
Three common controls used to protect the
- Backups
availability of information are
- access controls
- Protect,
According to the NIST framework, which of the
- Recover
following are considered key functions necessary
- Identify for the protection of digital assets?
https://quizlet.com/310579879/csx-cybersecurity-fundamentals-practice-questions-flash-cards/#_=_ 1/19
16/01/22, 08:24 Flashcard CSX Cybersecurity Fundamentals: Practice Questions | Quizlet
CSX Cybersecurity
risk to an organization's digital Fundamentals:
The core duty Practice Questi...
of cybersecurity is to identify, Studia
assets. respond and manage
https://quizlet.com/310579879/csx-cybersecurity-fundamentals-practice-questions-flash-cards/#_=_ 2/19
16/01/22, 08:24 Flashcard CSX Cybersecurity Fundamentals: Practice Questions | Quizlet
CSX
containCybersecurity
step-by-step Fundamentals:
Guidelines Practice Questi... Studia
https://quizlet.com/310579879/csx-cybersecurity-fundamentals-practice-questions-flash-cards/#_=_ 3/19
16/01/22, 08:24 Flashcard CSX Cybersecurity Fundamentals: Practice Questions | Quizlet
CSX Cybersecurity
coordinates and manages Fundamentals: Practice
Session layer of the OSI Questi... Studia
user connections
Encryption is an essential but best states the role of encryption within an overall
incomplete form of access cybersecurity program
control
Asset value, criticality, The number and types of layers needed for
reliability of each control and defense in depth are a function of
degree of exposure.
https://quizlet.com/310579879/csx-cybersecurity-fundamentals-practice-questions-flash-cards/#_=_ 4/19
16/01/22, 08:24 Flashcard CSX Cybersecurity Fundamentals: Practice Questions | Quizlet
CSX Cybersecurity
Who had access to the Fundamentals: Practice
Select three. The Questi...
chain of custody contains Studia
The estimated probability of Select all that apply. A business impact analysis
the identified threats actually (BIA) should identify
occurring, The efficiency and
effectiveness of existing risk
mitigation controls, A list of
potential vulnerabilities,
dangers and/or threats.
https://quizlet.com/310579879/csx-cybersecurity-fundamentals-practice-questions-flash-cards/#_=_ 5/19
16/01/22, 08:24 Flashcard CSX Cybersecurity Fundamentals: Practice Questions | Quizlet
CSX Cybersecurity
APTs typically originate from Fundamentals: Practice
Select all that apply. Questi...
Which of the following Studia
https://quizlet.com/310579879/csx-cybersecurity-fundamentals-practice-questions-flash-cards/#_=_ 6/19
16/01/22, 08:24 Flashcard CSX Cybersecurity Fundamentals: Practice Questions | Quizlet
https://quizlet.com/310579879/csx-cybersecurity-fundamentals-practice-questions-flash-cards/#_=_ 7/19
16/01/22, 08:24 Flashcard CSX Cybersecurity Fundamentals: Practice Questions | Quizlet
CSX Cybersecurity
Payload
Fundamentals: Practice
The attack mechanism Questi...
directed against a system is
Studia
https://quizlet.com/310579879/csx-cybersecurity-fundamentals-practice-questions-flash-cards/#_=_ 8/19
16/01/22, 08:24 Flashcard CSX Cybersecurity Fundamentals: Practice Questions | Quizlet
CSX
SecurityCybersecurity
continuous Fundamentals:
Describes the Practice Questi...
activities required to identify the
Studia
https://quizlet.com/310579879/csx-cybersecurity-fundamentals-practice-questions-flash-cards/#_=_ 9/19
16/01/22, 08:24 Flashcard CSX Cybersecurity Fundamentals: Practice Questions | Quizlet
CSX
ProvideCybersecurity
strategic direction, Fundamentals: Practice
Governance involves Questi...
all of the following Studia
Cyber risk, investment risk Which of the following falls within the scope of
and financial risk risk management
https://quizlet.com/310579879/csx-cybersecurity-fundamentals-practice-questions-flash-cards/#_=_ 10/19
16/01/22, 08:24 Flashcard CSX Cybersecurity Fundamentals: Practice Questions | Quizlet
CSX Cybersecurity
Ensuring information security Fundamentals: Practice
Risk management Questi...
does not involve Studia
https://quizlet.com/310579879/csx-cybersecurity-fundamentals-practice-questions-flash-cards/#_=_ 11/19
16/01/22, 08:24 Flashcard CSX Cybersecurity Fundamentals: Practice Questions | Quizlet
- Logging
Methods of control that can help protect integrity
- Digital Signatures
- Hashes
- Encryption
- full
Types of backups
- incremental
- differential
https://quizlet.com/310579879/csx-cybersecurity-fundamentals-practice-questions-flash-cards/#_=_ 12/19
16/01/22, 08:24 Flashcard CSX Cybersecurity Fundamentals: Practice Questions | Quizlet
CSX
Loss of Cybersecurity
functionality and Fundamentals: Practice
Potential consequences Questi...
resulting from lack of
Studia
- Transactional logs
Nonrepudiation is implemented through which
- Digital signatures methods
- redundancy
Three common controls used to protect the
- backups
availability of information are:
- access controls
https://quizlet.com/310579879/csx-cybersecurity-fundamentals-practice-questions-flash-cards/#_=_ 13/19
16/01/22, 08:24 Flashcard CSX Cybersecurity Fundamentals: Practice Questions | Quizlet
CSX Cybersecurity
-providing strategic direction
Fundamentals: Practice
Governance has Questi...
several goals, including: Studia
- Identify
According to the NIST cybersecurity framework,
- Protect
what are considered key functions necessary for
- Detect
the protection of digital assets?
- Respond
- Recover
https://quizlet.com/310579879/csx-cybersecurity-fundamentals-practice-questions-flash-cards/#_=_ 14/19
16/01/22, 08:24 Flashcard CSX Cybersecurity Fundamentals: Practice Questions | Quizlet
https://quizlet.com/310579879/csx-cybersecurity-fundamentals-practice-questions-flash-cards/#_=_ 15/19
16/01/22, 08:24 Flashcard CSX Cybersecurity Fundamentals: Practice Questions | Quizlet
- an intruder must penetrate The key benefits of the DMZ system are:
three separate devices
Encryption is an essential but Which of the following best states the role of
incomplete form of access encryption within an overall cybersecurity
control. program?
asset value, criticality, The number and types of layers needed for
reliability of each control and defense in depth are a function of:
degree of exposure.
https://quizlet.com/310579879/csx-cybersecurity-fundamentals-practice-questions-flash-cards/#_=_ 16/19
16/01/22, 08:24 Flashcard CSX Cybersecurity Fundamentals: Practice Questions | Quizlet
CSX Cybersecurity
- Planning
Fundamentals: Practice
The steps of the penetrationQuesti...
testing phase inStudia
the
- Discovery
correct order are:
- Attack
- Reporting
- Accounting management
What are considered functional areas of network
- Fault management management as defined by ISO?
- Performance management
- Security management
- Preparation
The steps of incident response in order are:
- Detection and analysis
- Investigation
- Post-incident analysis
https://quizlet.com/310579879/csx-cybersecurity-fundamentals-practice-questions-flash-cards/#_=_ 17/19
16/01/22, 08:24 Flashcard CSX Cybersecurity Fundamentals: Practice Questions | Quizlet
CSX Cybersecurity
- Who had access to the Fundamentals: Practice
The chain of custody Questi...
contains information Studia
- a list of potential
vulnerabilities, dangers
and/or threats.
https://quizlet.com/310579879/csx-cybersecurity-fundamentals-practice-questions-flash-cards/#_=_ 18/19
16/01/22, 08:24 Flashcard CSX Cybersecurity Fundamentals: Practice Questions | Quizlet
CSX Cybersecurity
- APTs typically originate from Fundamentals: Practice
Which of the following Questi...
statements about Studia
- Organizational risk
Choose three. Which types of risk are typically
- Technical risk
associated with mobile devices?
- Physical risk
https://quizlet.com/310579879/csx-cybersecurity-fundamentals-practice-questions-flash-cards/#_=_ 19/19