The Ultimate Quiz On Information Assets

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By P_baus
P
P_baus
Community Contributor
Quizzes Created: 1 | Total Attempts: 219
| Attempts: 219
SettingsSettings
Please wait...
  • 1/238 Questions

    Information assets have ____ when authorized users - persons or computer systems - are able to access them in the specified format without interference or obstruction.

    • Availability
    • Risk assessment
    • Integrity
    • Confidentiality
Please wait...
Information Security Quizzes & Trivia
About This Quiz

Explore the essentials of safeguarding information assets with this quiz. Assess your understanding of availability, confidentiality, integrity, mitigation strategies, and recovery plans. Ideal for learners aiming to enhance their knowledge in information security practices.


Quiz Preview

  • 2. 

    The purpose of the ____ is to define the scope of the CP operations and establish managerial intent with regard to timetables for response to incidents, recovery from disasters, and  reestablishment of operations for continuity.

    • Contingency planning policy

    • Incident response policy

    • Disaster recovery policy

    • Cross-training policy

    Correct Answer
    A. Contingency planning policy
    Explanation
    Cap 2

    Rate this question:

  • 3. 

    The focus during a(n) ____ is on learning what worked, what didn't, and where communications and response procedures may have failed.

    • After action review

    • Advisory distribution

    • Incident response

    • CSIRT resource meeting

    Correct Answer
    A. After action review
    Explanation
    Cap 6

    Rate this question:

  • 4. 

    A ____ attack is much more substantial than a DoS attack because of the use of multiple systems to simultaneously attack a single target.

    • Heartbeat attack

    • Distributed denial-of-service

    • Networked denial-of-service

    • Targeted denial-of-service

    Correct Answer
    A. Distributed denial-of-service
    Explanation
    Cap 7

    Rate this question:

  • 5. 

    The ____ team is responsible for reestablishing connectivity between systems and to the Internet.

    • System recovery

    • Storage recovery

    • Applications recovery

    • Network recovery

    Correct Answer
    A. Network recovery
    Explanation
    Cap 10

    Rate this question:

  • 6. 

    ____ is the process of moving an organization toward its vision.

    • Strategic planning

    • Contingency planning

    • Enterprise information planning

    • Security planning

    Correct Answer
    A. Strategic planning
    Explanation
    Cap 1

    Rate this question:

  • 7. 

    The Southeast Collegiate Cyber Defense Competition is unique in that it focuses on the operational aspect of managing and protecting an existing network infrastructure. Unlike "capture-the-flag " exercises, this competition is exclusively a real-world ____ competition.

    • End-user training

    • Offensive

    • Defensive

    • Hacking

    Correct Answer
    A. Defensive
    Explanation
    Cap 4

    Rate this question:

  • 8. 

    In an attack known as ____, valid protocol packets exploit poorly configured DNS servers to inject false information to corrupt the servers' answers to routine DNS queries from other systems on that network.

    • DNS cache poisoning

    • Denial-of-service (DoS)

    • Port mirroring

    • Evasion

    Correct Answer
    A. DNS cache poisoning
    Explanation
    Cap 5

    Rate this question:

  • 9. 

    The task of monitoring file systems for unauthorized change is best performed by using a(n) ____.

    • HIDPS

    • Knowledge-based IDPS

    • NIDPS

    • AppIDPS

    Correct Answer
    A. HIDPS
    Explanation
    Cap 5

    Rate this question:

  • 10. 

    The ____ team is primarily responsible for data restoration and recovery.

    • Data management

    • Vendor contact

    • Applications recovery

    • Storage recovery

    Correct Answer
    A. Data management
    Explanation
    Cap 10

    Rate this question:

  • 11. 

    ____ are highly probable when infected machines are brought back online or when other infected computers that may have been offline at the time of the attack are brought back up. 

    • Follow-on incidents

    • Blue bag operations

    • Black bag operations

    • War games

    Correct Answer
    A. Follow-on incidents
    Explanation
    Cap 9

    Rate this question:

  • 12. 

    A(n) ____ is an investigation and assessment of the impact that various attacks can have on the organizatio.

    • Business impact analysis (BIA)

    • Business continuity analysis (BCA)

    • Incident response analysis (IRA)

    • Threat analysis

    Correct Answer
    A. Business impact analysis (BIA)
    Explanation
    Cap 1

    Rate this question:

  • 13. 

    A(n) ____ is used to anticipate, react to, and recover from events that threaten the security of information and information assets in an organization; it is also used to restore the organization to normal modes of business operations;

    • Contingency plan

    • Security plan

    • Threat plan

    • Social plan

    Correct Answer
    A. Contingency plan
    Explanation
    Cap 1

    Rate this question:

  • 14. 

    ____ assigns a risk rating or score to each information asset. Although this number does not mean anything in absolute terms, it is useful in gauging the relative risk to each vulnerable information asset and facilitates the development of comparative ratings later in the risk control process.

    • Avoidance

    • BC

    • DR

    • Risk assessment

    Correct Answer
    A. Risk assessment
    Explanation
    Cap 1

    Rate this question:

  • 15. 

    ____ is a risk control approach that attempts to shift the risk to other assets, other processes, or other organizations.

    • Transference

    • Avoidance

    • Acceptance

    • Mitigation

    Correct Answer
    A. Transference
    Explanation
    Cap 1

    Rate this question:

  • 16. 

    A(n) ____ is a CSIRT team member, other than the team leader, who is currently performing the responsibilities of the team leader in scanning the organization's information infrastructure for signs of an incident.

    • IR duty officer

    • Project manager

    • Software engineer

    • Forensic expert

    Correct Answer
    A. IR duty officer
    Explanation
    Cap 4

    Rate this question:

  • 17. 

    The U.S. National Institute of Standards and Technology defines the incident response life cycle as having four main processes: 1) preparation; 2) detection and analysis; 3) containment, eradication, and recovery; and 4) ____.

    • Post-incident activity

    • Incident report

    • Resolution

    • Triage

    Correct Answer
    A. Post-incident activity
    Explanation
    Cap 4

    Rate this question:

  • 18. 

    One of the primary responsibilities of the IRP team is to ensure that the ____ is prepared to respond to each incident it may face.

    • Catalyst

    • Semtex

    • CSIRT

    • IR plan

    Correct Answer
    A. CSIRT
    Explanation
    Cap 4

    Rate this question:

  • 19. 

    Using a process known as ____, network-based IDPSs look for attack patterns by comparing measured activity to known signatures in their knowledge base to determine whether or not an attack has occurred or may be under way.

    • Port monitoring

    • Signature matching

    • Packet sniffing

    • Traffic measurement

    Correct Answer
    A. Signature matching
    Explanation
    Cap 5

    Rate this question:

  • 20. 

    The first group to communicate the CSIRT's vision and operational plan is the managerial team or individual serving as the ____.

    • IT staff leader

    • Educational liaison

    • Champion

    • Technical lead

    Correct Answer
    A. Champion
    Explanation
    Cap 6

    Rate this question:

  • 21. 

    According to NIST, which of the following is an example of a UA attack?

    • Modifying Web-based content without permission

    • Asking for large numbers of resources

    • Knowingly sending a virus-infected message

    • Downloading unauthorized software

    Correct Answer
    A. Modifying Web-based content without permission
    Explanation
    Cap 7

    Rate this question:

  • 22. 

    ____ is used both for intrusion analysis and as part of evidence collection and analysis.

    • Loss analysis

    • Configuration

    • Forensics

    • Rehearsal

    Correct Answer
    A. Forensics
    Explanation
    Cap 8

    Rate this question:

  • 23. 

    ____ is a valuable resource for additional information on building and staffing CSIRTs.

    • IRP

    • CSIRT Performance Measures

    • AAR

    • NIST

    Correct Answer
    A. NIST
    Explanation
    Cap 6

    Rate this question:

  • 24. 

    The ____ handles computer crimes that are categorized as felonies.

    • Department of Defense

    • U.S. Treasury Department

    • FBI

    • U.S. Secret Service

    Correct Answer
    A. FBI
    Explanation
    Cap 8

    Rate this question:

  • 25. 

    A ____ is used for an office or small campus, with segment distances measured in tens of meters. It may have only a few hosts, or it may have hundreds of clients with multiple servers.

    • WAN

    • LAN

    • Cache

    • Filter

    Correct Answer
    A. LAN
    Explanation
    Cap 9

    Rate this question:

  • 26. 

    A(n) ____ is an object, person, or other entity that is a potential risk of loss to an asset.

    • Threat

    • Intellectual property

    • Payload

    • Trojan horse

    Correct Answer
    A. Threat
    Explanation
    Cap 1

    Rate this question:

  • 27. 

    The ____ is an investigation and assessment of the impact that various events or incidents can have on the organization.

    • Forensic analysis

    • Threat of attack analysis

    • Cross-training analysis

    • Business impact analysis

    Correct Answer
    A. Business impact analysis
    Explanation
    Cap 2

    Rate this question:

  • 28. 

    Some recovery strategies seek to improve the ____ of a server or system in addition to, or instead of, performing backups of data.

    • Speed

    • Accuracy

    • Cost-effectiveness

    • Robustness

    Correct Answer
    A. Robustness
    Explanation
    Cap 3

    Rate this question:

  • 29. 

    A resumption location known as a ____  or a _______ is a fully configured computer facility capable of establishing operations at a moment's notice.

    • Mobile site

    • Service bureau

    • Hot site

    • Mirrored site

    Correct Answer(s)
    A. Hot site
    A. Mirrored site
    Explanation
    A resumption location known as a hot site or a mirrored site is a fully configured computer facility capable of establishing operations at a moment's notice. These sites are designed to replicate the primary site's infrastructure, systems, and data, ensuring that critical operations can be quickly resumed in the event of a disaster or disruption. The term "hot site" refers to a facility that is ready and operational, while a "mirrored site" refers to a site that replicates the primary site's data and systems in real-time, providing continuous synchronization. Both hot sites and mirrored sites are essential for business continuity and disaster recovery planning.

    Rate this question:

  • 30. 

    The process of evaluating the circumstances around organizational events includes determining which adverse events are possible incidents, or ____.

    • Critical violations

    • Incident candidates

    • Service alarms

    • Hacker intrusions

    Correct Answer
    A. Incident candidates
    Explanation
    Cap 5

    Rate this question:

  • 31. 

    A(n) ____ is a sign that an activity now occurring may signal an incident that could occur in the future.

    • Inactive system

    • Precursor

    • Signal

    • Indication

    Correct Answer
    A. Precursor
    Explanation
    Cap 5

    Rate this question:

  • 32. 

    The Business Continuity Institute offers an uncertified category of membership called a(n) ____ that is accepted by application and does not require assessment or a review process.

    • Associate

    • Affiliate

    • Specialist

    • Fellow

    Correct Answer
    A. Affiliate
    Explanation
    Cap 11

    Rate this question:

  • 33. 

    When an organization completely outsources its IR work, typically to an on-site contractor, it is called a(n) ____ model.

    • Partially outsourced

    • Employees

    • 24/7

    • Fully outsourced

    Correct Answer
    A. Fully outsourced
    Explanation
    Cap 6

    Rate this question:

  • 34. 

    A key step in the ____ approach to incident response is to discover the identify of the intruder while documenting his or her activity.

    • Proactive security awareness

    • Security quality management

    • Protect and forget

    • Apprehend and prosecute

    Correct Answer
    A. Apprehend and prosecute
    Explanation
    Cap 6

    Rate this question:

  • 35. 

    The determination of what systems fall under the CSIRT 's responsibility is called its ____.

    • Mission

    • Scope of operations

    • Policy

    • Constituency

    Correct Answer
    A. Scope of operations
    Explanation
    Cap 6

    Rate this question:

  • 36. 

    When an alert warns of new malicious code that targets software used by an organization, the first response should be to research the new virus to determine whether it is ____.

    • Authorized

    • Real

    • Intrusive

    • Aggressive

    Correct Answer
    A. Real
    Explanation
    Cap 7

    Rate this question:

  • 37. 

    When an incident includes a breach of physical security, all aspects of physical security should be escalated under a containment strategy known as ____.

    • Block

    • Lockdown

    • Isolation

    • Disablement

    Correct Answer
    A. Lockdown
    Explanation
    Cap 7

    Rate this question:

  • 38. 

    Clifford Stoll's book, ____, provides an excellent story about a real-world incident that turned into an international tale of espionage and intrigue.

    • Under Attack

    • The Cuckoo's Egg

    • The Hacker

    • Stalking the Wily Hacker

    Correct Answer
    A. The Cuckoo's Egg
    Explanation
    Cap 7

    Rate this question:

  • 39. 

    The ____ phase of forensic analysis involves the use of forensic tools to recover the content of files that were deleted, operating system artifacts (such as event data and logging of user actions), and other relevant facts.

    • Discovery

    • Analysis

    • Field

    • Examination

    Correct Answer
    A. Examination
    Explanation
    Cap 8

    Rate this question:

  • 40. 

    ____ are likely in the event of a hacker attack, when the attacker retreats to a chat room and describes in specific detail to his or her associates the method and results of his or her latest conquest. 

    • Blue bag operations

    • Black bag operations

    • Follow-on incidents

    • War games

    Correct Answer
    A. Follow-on incidents
    Explanation
    Cap 9

    Rate this question:

  • 41. 

    In the context of disaster notification, the ____ is a scripted description of the disaster and consists of just enough information so that each response knows what port of the DR plan to implement.

    • Desk check

    • Alert message

    • Trigger message

    • Stand-down

    Correct Answer
    A. Alert message
    Explanation
    Cap 10

    Rate this question:

  • 42. 

    The ____ system is an information system with a telephony interface that can be used to automate the alert process.

    • Damage assessment report

    • DR plan desk system

    • DR plan simulation

    • Auxiliary phone alert and reporting system

    Correct Answer
    A. Auxiliary phone alert and reporting system
    Explanation
    Cap 10

    Rate this question:

  • 43. 

    In a CPMT, a(n) ____ should be a high-level manager with influence and resources that can be used to support the project team, promote the objectives of the CP project, and endorse the results that come from the combined effort.

    • project manager

    • Crisis manager

    • Incident manager

    • Champion

    Correct Answer
    A. Champion
    Explanation
    Cap 2

    Rate this question:

  • 44. 

    ____ ensures that only those with the rights and privileges to access information are able to do so.

    • Confidentiality

    • Risk assessment

    • Availability

    • Integrity

    Correct Answer
    A. Confidentiality
    Explanation
    Cap 1

    Rate this question:

  • 45. 

    ____ is the risk control approach that attempts to reduce the impact caused by the exploitation of vulnerability through planning and preparation.

    • Mitigation

    • Acceptance

    • Transference

    • Avoidance

    Correct Answer
    A. Mitigation
    Explanation
    Cap 1

    Rate this question:

  • 46. 

    Information assets have ____ when they are not exposed (while being stored, processed, or transmitted) to corruption, damage, destruction, or other disruption of their authentic states.

    • Integrity

    • Availability

    • Confidentiality

    • Risk assessment

    Correct Answer
    A. Integrity
    Explanation
    Cap 1

    Rate this question:

  • 47. 

    The ____ illustrates the most critical characteristics of information and has been the industry standard for computer security since the development of the mainframe.

    • C.I.A. triangle

    • Asset classification

    • Strategic plan

    • Disaster recovery plan

    Correct Answer
    A. C.I.A. triangle
    Explanation
    Cap 1

    Rate this question:

  • 48. 

    ____ hack systems to conduct terrorist activities through network or Internet pathways.

    • Programmers

    • Social engineers

    • Script kiddies

    • Cyberterrorists

    Correct Answer
    A. Cyberterrorists
    Explanation
    Cap 1

    Rate this question:

  • 49. 

    The ____ job functions and organizational roles focus on protecting the organization's information systems and stored information from attacks.

    • Organizational management and professionals

    • Information security management and professionals

    • Information technology management and professionals

    • Human resource management and professional

    Correct Answer
    A. Information security management and professionals
    Explanation
    Cap 2

    Rate this question:

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Apr 10, 2017
    Quiz Created by
    P_baus
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.