How do organizations use security frameworks to develop an effective security posture?
As a guide to reduce risk and protect data and privacy
A security professional uses _____ to verify that an employee has permission to access a resource.
authorization
A person’s fingerprint, eye or palm scan are examples of what?
Biometrics
Which of the following statements accurately describe the CSF? Select all that apply.
You work as a security analyst for a supply chain organization and need to confirm all inventory data is correct, authentic, and reliable. Which core principle of the CIA triad are you using?
Integrity
A security team establishes controls, including permission settings that will be used to create multiple security points that a threat actor must get through to breach their organization. Which OWASP principle does this scenario describe?
Defense in depth
What are some of the primary objectives of an internal security audit? Select all that apply.
In an internal security audit, _____ involves identifying potential threats, risks, and vulnerabilities in order to decide what security measures should be implemented.
conducting a risk assessment
A security analyst performs an internal security audit. They determine that the organization needs to install surveillance cameras at various store locations. What are they working to establish?
Physical controls
What information is typically communicated to stakeholders after completion of an internal security audit? Select all that apply.
What is the purpose of a security framework?
Build plans to help mitigate risks and threats to data and privacy
A security professional uses _____ to convert data from a readable format to an encoded format.
encryption
Which of the following characteristics are examples of biometrics? Select all that apply.
A security team considers how to avoid unnecessarily complicated solutions when implementing security controls. Which OWASP principle does this scenario describe?
Keep security simple
The planning elements of an internal security audit include establishing scope and _____, then conducting a risk assessment.
goals
A security analyst performs an internal security audit. They focus on the human component of cybersecurity, such as the policies and procedures that define how their company manages data. What are they working to establish?
Administrative controls
An employee using multi-factor authentication to verify their identity is an example of the _____ process.
authentication
What type of social engineering attack attempts to exploit biometrics?
Vishing