Reference no: EM132252507
1. Which of the following is a problem in business regarding cyber security?
A. Companies are spending too much money on research and development on cyber security
B. Companies have been too invested in overcoming malware viruses
C. Companies are focused on security solutions that are easy to implement, but this protection is usually not strong enough
D. Companies are currently not encountering any problems in cyber security
2. Which of the following is not one of the five questions every executive should ask about cybersecurity?
A. Should more funding be provided to the IT department for cybersecurity
B. How would we recognize a breach if it occurred?
C. When did we last perform our last assessment and what did it cover?
D. Does the security program match our risk tolerance?
3. According to the presenter, what are the four controls necessary for a successful cybersecurity program?
A. Protect, Counter, Recover, Maintain
B. Protect, Avoid, Identify, Overcome
C. Protect, Detect, Identify, Maintain
D. Protect, Detect, Respond, Recover
4. Cyber-attacks are implemented most commonly through which medium?
A. Email Links
B. Social Media
C. Websites of a Web Application
D. USB Sticks
5. Which of the following is not a method of mitigating cyber-attacks that is mentioned by the presenter?
A. Using behavior analytics to identify risks before they occur
B. Limiting the number of managers with access to vulnerable information systems
C. Implementing configuration management systems
D. Requiring multifactor authentication for logins to delicate information