What is the most important aspect of security awareness/training?
Protecting health and human safety
Which of the following can be used to map data flows through an organization and the relevant security controls used at each point along the way?
Data life cycle
What is the life cycle of data handling?
Create, store, use, share, archive, destroy
What do integrity services, provided by hash functions and digital signatures, allow a recipient to verify?
That a message has not been altered by malice or error
What is the purpose of security awareness training?
To align information security goals with the organization’s mission and vision
What is the primary purpose of storing passwords as hash values or digests?
To check if a password matches without revealing the password itself
What is the role of security engineers in data security?
Security engineers figure out who is trying to log in and assess security codes
How long does it take to crack a 10-number password using software with cryptographic calculation?
5 seconds
What is something which every security policy should have?
Consequences for non-compliance
What does the term “whaling attacks” refer to in the context of phishing?
Attacks against highly placed officials or individuals with sizable assets
Which type of organization is likely to have a stricter acceptable use policy according to the passage?
Healthcare facility, research institution, or defense contractor
What task is recommended for employees to practice what they’ve learned?
Sending simulated phishing emails
What solution is recommended for users who struggle to remember multiple passwords for different systems?
Encourage the use of a recommended password management solution
Why is asymmetric encryption considered more secure?
It involves a unique code for the sender and receiver
What does Egress monitoring regulate?
Data leaving the organization’s IT environment
How does hashing respond to minor changes in the input, such as misspellings or changes in letter case?
It generates a different hash digest for each input
What is the purpose of training in an anti-phishing campaign?
To increase the proficiency of staff in identifying phishing emails
Which organizational policy is most likely to indicate which types of smartphones can be used to connect to the internal IT environment?
The BYOD policy (bring your own device)
What is meant by the term rollback?
Restoring the system to its previous state before a change
Who is often tasked with coordinating the change management effort?
Information Security professionals
What is the first step in the change management process?
Request for Change (RFC)
What is a mode of encryption which ensures confidentiality efficiently, with a minimum amount of processing overhead?
Symmetric
How should Logs be stored from the systems they’re logging
Separately
Which key is kept secret in asymmetric encryption?
Private Key