Module Four Quiz-
In the Anthem Blue Cross breach, where 80 million names, birthdays, social security numbers, etc., were stolen, the hackers got in by which of the following? Select one.
Which of the following are examples of multi-factor authentication (MFA)? Select all that apply.
System updates and patches provided by system vendors is the practice known as which of the following? Select one.
Which of the following is the concept of having multiple layers of security policies and practices? Select one.
Which of the following is the function of the NIST Cybersecurity Framework that involves making a list of physical and software assets within the organization to establish the basis of an asset management program? Select one.
Which of the following is the percentage of all firms that have been breached or experienced a cyberattack? Select one.
Which of the following is the function of the NIST Cybersecurity Framework that involves empowering employees and managers within the organization through awareness and training, including role-based and privileged user training? Select one.
Which of the following is the function of the NIST Cybersecurity Framework that involves taking action on a detected cybersecurity breach? Select one.
Which of the following is used by many organizations, and even consumers, to control access to a network like the internet, allowing only authorized traffic to pass? Select one.
Which of the following best describes an “evil twin” in the context of computer security? Select one.