問題一覧
1
Threat
2
Natural, Unintentional, Intentional
3
Floods, Hurricanes, Tornadoes
4
Unintentional Threat
5
Spyware, Malware, Adware Companies, Actions of a disgruntled employee
6
harm to an organization
7
Exposure to an automated attack
8
May 12, 2017
9
WannaCry Ransomware
10
2017 Internet Security Threat Report
11
Worms, Viruses, WannaCry Ransomware
12
Ensure team members are informed on current trends in cyber security so that it will be easier for them to identify new threats. Perform regular threat assessments.
13
Perform regular threat assessments
14
Perform regular threat assessments
15
Vulnerability
16
Both intentional and unintentional threats
17
Automated Attackers
18
Quick Response
19
Understanding your vulnerabilities
20
I remembered
21
Risk
22
Financial Losses, Loss of Privacy, Reputational Damage, Legal Implications, Loss of Life
23
Creating and implementing risk management plan
24
Assess risk and determine needs. Include a total stakeholder perspective. Designate a central group of employees. Implement appropriate policies and related controls. Monitor and evaluate policy and control effectiveness.
25
Assess risk and determine needs
26
Include a total stakeholder perspective
27
Designate a central group of employees
28
Implement appropriate policies and related controls
29
Monitor and evaluate policy and control effectiveness
30
Threat
31
Intentional or Accidental
32
Malware, Phishing Attacks, DDOS, Data Breaches, Cryptojacking
33
Accidental Data Exposure, Misconfiguration, Lost Devices, Outdated Software, Weak Passwords, Human Error, Inadequate Security Training
34
I remembered
35
Physical Damage, Natural Events, Loss of Essential Services, Compromise of Information, Technical Failures, Compromise of Functions
36
Fire, Water, Pollution
37
Climatic, Seismic, Volcanic
38
Electrical Power, Air Conditioning, Telecommunication
39
Eavesdropping, Theft of Media, Retrieval of Discarded Materials
40
Equipment, Software, Capacity Saturation
41
Error in Use, Abuse of Rights, Denial of Actions
42
Spoofing Attack
43
Tampering
44
Repudiation Attack
45
Denial of Services
46
Elevation of Privileges
47
DOS
48
Theft
49
Substitution
50
Deletion
51
Loss
52
Involuntary Machine Slaughter
53
Involuntary Machine Slaughter
54
Voluntary Machine Slaughter
55
Machinicide
56
True
57
Theft or Destruction
58
locks, guards
59
600,000
60
True
61
enhance
62
Software is enhanced
63
Configuration Management
64
Configuration Management
65
Configuration Management
66
delete, modifications
67
Because it is susceptible to "off by one" errors
68
True
69
Logic Bomb
70
Extended Program Functioning
71
Trojan Horse, Virus, Trapdoor
72
Trojan Horse
73
Virus
74
Trapdoor
75
Software Theft
76
Hardware Security
77
Software Security
78
True
79
Data Attack
80
Principle of Adequate Protection
81
Principle of Adequate Protection
82
Unauthorized Disclosure
83
Unauthorized Modification
84
Denial of Authorized Access
85
Tapping wires, Planting bugs in output devices, Sifting through trash receptacles, Monitoring electromagnetic radiation, Bribing key employees, Inferring one data point from other values, Requesting the data
86
True
87
Data Integrity
88
Salami Attack
89
Salami Attack
90
Data Integrity
91
Identity Theft
92
I remembered
93
1,473, 2019, Identity Theft Resource Center's End-of-Year 2019 Data Breach Report, 17
94
July 2019
95
Phishing, Skimming, Wifi Hacking, Dumpster Diving, Phone Scams, Data Breaches, Malware, Mail Theft, Child ID Theft, Tax ID Theft
96
Steal your money or benefits. Sell it on the dark web. Impersonate you.
97
I remembered
98
I remembered
99
Criminal, Medical, Financial, Child Identity Theft, Synthetic Identity Theft
100
Criminal Identity Theft
M#5 Section and Title v2
M#5 Section and Title v2
ユーザ名非公開 · 32問 · 13日前M#5 Section and Title v2
M#5 Section and Title v2
32問 • 13日前MPLE
MPLE
ユーザ名非公開 · 41問 · 13日前MPLE
MPLE
41問 • 13日前Weekly Test 3
Weekly Test 3
ユーザ名非公開 · 50問 · 13日前Weekly Test 3
Weekly Test 3
50問 • 13日前Weekly Test 2
Weekly Test 2
ユーザ名非公開 · 50問 · 13日前Weekly Test 2
Weekly Test 2
50問 • 13日前Weekly Test 1
Weekly Test 1
ユーザ名非公開 · 50問 · 13日前Weekly Test 1
Weekly Test 1
50問 • 13日前Refresher SPDI 1
Refresher SPDI 1
ユーザ名非公開 · 9問 · 13日前Refresher SPDI 1
Refresher SPDI 1
9問 • 13日前Refresher SPDI 1
Refresher SPDI 1
ユーザ名非公開 · 100問 · 13日前Refresher SPDI 1
Refresher SPDI 1
100問 • 13日前Definition of Terms 3
Definition of Terms 3
ユーザ名非公開 · 90問 · 13日前Definition of Terms 3
Definition of Terms 3
90問 • 13日前Definition of Terms 2
Definition of Terms 2
ユーザ名非公開 · 90問 · 13日前Definition of Terms 2
Definition of Terms 2
90問 • 13日前Definition of Terms 1
Definition of Terms 1
ユーザ名非公開 · 90問 · 13日前Definition of Terms 1
Definition of Terms 1
90問 • 13日前WT 6
WT 6
ユーザ名非公開 · 50問 · 13日前WT 6
WT 6
50問 • 13日前WT 3
WT 3
ユーザ名非公開 · 50問 · 13日前WT 3
WT 3
50問 • 13日前WT 2
WT 2
ユーザ名非公開 · 48問 · 13日前WT 2
WT 2
48問 • 13日前SPI version D pt 2
SPI version D pt 2
ユーザ名非公開 · 61問 · 13日前SPI version D pt 2
SPI version D pt 2
61問 • 13日前Standpipe Requirements
Standpipe Requirements
ユーザ名非公開 · 29問 · 13日前Standpipe Requirements
Standpipe Requirements
29問 • 13日前Principles and Code of Ethics
Principles and Code of Ethics
ユーザ名非公開 · 29問 · 13日前Principles and Code of Ethics
Principles and Code of Ethics
29問 • 13日前RNPCP Chapter 10 to 13
RNPCP Chapter 10 to 13
ユーザ名非公開 · 93問 · 13日前RNPCP Chapter 10 to 13
RNPCP Chapter 10 to 13
93問 • 13日前RNPCP Chapter 6 to 9
RNPCP Chapter 6 to 9
ユーザ名非公開 · 94問 · 13日前RNPCP Chapter 6 to 9
RNPCP Chapter 6 to 9
94問 • 13日前Item 303 Bituminous Seal Coat
Item 303 Bituminous Seal Coat
ユーザ名非公開 · 20問 · 13日前Item 303 Bituminous Seal Coat
Item 303 Bituminous Seal Coat
20問 • 13日前Item 301 Bituminous Prime Coat
Item 301 Bituminous Prime Coat
ユーザ名非公開 · 10問 · 13日前Item 301 Bituminous Prime Coat
Item 301 Bituminous Prime Coat
10問 • 13日前問題一覧
1
Threat
2
Natural, Unintentional, Intentional
3
Floods, Hurricanes, Tornadoes
4
Unintentional Threat
5
Spyware, Malware, Adware Companies, Actions of a disgruntled employee
6
harm to an organization
7
Exposure to an automated attack
8
May 12, 2017
9
WannaCry Ransomware
10
2017 Internet Security Threat Report
11
Worms, Viruses, WannaCry Ransomware
12
Ensure team members are informed on current trends in cyber security so that it will be easier for them to identify new threats. Perform regular threat assessments.
13
Perform regular threat assessments
14
Perform regular threat assessments
15
Vulnerability
16
Both intentional and unintentional threats
17
Automated Attackers
18
Quick Response
19
Understanding your vulnerabilities
20
I remembered
21
Risk
22
Financial Losses, Loss of Privacy, Reputational Damage, Legal Implications, Loss of Life
23
Creating and implementing risk management plan
24
Assess risk and determine needs. Include a total stakeholder perspective. Designate a central group of employees. Implement appropriate policies and related controls. Monitor and evaluate policy and control effectiveness.
25
Assess risk and determine needs
26
Include a total stakeholder perspective
27
Designate a central group of employees
28
Implement appropriate policies and related controls
29
Monitor and evaluate policy and control effectiveness
30
Threat
31
Intentional or Accidental
32
Malware, Phishing Attacks, DDOS, Data Breaches, Cryptojacking
33
Accidental Data Exposure, Misconfiguration, Lost Devices, Outdated Software, Weak Passwords, Human Error, Inadequate Security Training
34
I remembered
35
Physical Damage, Natural Events, Loss of Essential Services, Compromise of Information, Technical Failures, Compromise of Functions
36
Fire, Water, Pollution
37
Climatic, Seismic, Volcanic
38
Electrical Power, Air Conditioning, Telecommunication
39
Eavesdropping, Theft of Media, Retrieval of Discarded Materials
40
Equipment, Software, Capacity Saturation
41
Error in Use, Abuse of Rights, Denial of Actions
42
Spoofing Attack
43
Tampering
44
Repudiation Attack
45
Denial of Services
46
Elevation of Privileges
47
DOS
48
Theft
49
Substitution
50
Deletion
51
Loss
52
Involuntary Machine Slaughter
53
Involuntary Machine Slaughter
54
Voluntary Machine Slaughter
55
Machinicide
56
True
57
Theft or Destruction
58
locks, guards
59
600,000
60
True
61
enhance
62
Software is enhanced
63
Configuration Management
64
Configuration Management
65
Configuration Management
66
delete, modifications
67
Because it is susceptible to "off by one" errors
68
True
69
Logic Bomb
70
Extended Program Functioning
71
Trojan Horse, Virus, Trapdoor
72
Trojan Horse
73
Virus
74
Trapdoor
75
Software Theft
76
Hardware Security
77
Software Security
78
True
79
Data Attack
80
Principle of Adequate Protection
81
Principle of Adequate Protection
82
Unauthorized Disclosure
83
Unauthorized Modification
84
Denial of Authorized Access
85
Tapping wires, Planting bugs in output devices, Sifting through trash receptacles, Monitoring electromagnetic radiation, Bribing key employees, Inferring one data point from other values, Requesting the data
86
True
87
Data Integrity
88
Salami Attack
89
Salami Attack
90
Data Integrity
91
Identity Theft
92
I remembered
93
1,473, 2019, Identity Theft Resource Center's End-of-Year 2019 Data Breach Report, 17
94
July 2019
95
Phishing, Skimming, Wifi Hacking, Dumpster Diving, Phone Scams, Data Breaches, Malware, Mail Theft, Child ID Theft, Tax ID Theft
96
Steal your money or benefits. Sell it on the dark web. Impersonate you.
97
I remembered
98
I remembered
99
Criminal, Medical, Financial, Child Identity Theft, Synthetic Identity Theft
100
Criminal Identity Theft