Security posture refers to an organization’s ability to react to _____ and manage its defense of critical assets and data.
change
Which of the following examples are key focus areas of the security and risk management domain? Select all that apply.
What is the goal of business continuity?
Maintain everyday productivity
What security concept involves all individuals in an organization taking an active role in reducing risk and maintaining security?
Secure coding
Remote services
Employee retention
Shared responsibility
Shared responsibility
A security analyst researches ways to improve access and authorization at their business. Their primary goal is to keep data secure. Which security domain does this scenario describe?
Asset security
Communication and network security
Security assessment and testing
Identity and access management
Identity and access management
A security analyst is asked to conduct a security audit to identify vulnerabilities. Which security domain is this task related to?
Security assessment and testing
When working in the software development security domain, security team members can use each phase of the software development _____ to conduct security reviews and ensure that security can be fully integrated into software products.
lifecycle
Which of the following statements accurately describe risk? Select all that apply.
A business experiences an attack. As a result, a major news outlet reports the attack, which creates bad press for the organization. What type of consequence does this scenario describe?
Damage to reputation
In the Risk Management Framework (RMF), which step involves officially approving a system to operate and taking responsibility for its potential risks?
Authorize
What term describes an organization’s ability to maintain its everyday productivity by establishing risk disaster recovery plans?
Business continuity
According to the concept of shared responsibility, employees can help lower risk to physical and virtual security by _____. Select two answers.
A security analyst ensures that employees are able to review only the data they need to do their jobs. Which security domain does this scenario relate to?
Identity and access management
Which of the following are steps of implementing security controls? Select three answers.
The software development security domain involves the use of the software development ___, which is an efficient process used by teams to quickly build software products and services.
lifecycle
In the Risk Management Framework (RMF), the _____ step might involve implementing a plan to change password requirements in order to reduce requests to reset employee passwords.
implement