CC
Q: 1
What type of malware is used to take hostage a user's data and require a ransom payment for release?
Options
Q: 2
Which of the following principles states that individuals should be held to a standard of doing what a
reasonable person would do under similar circumstances?
Options
Q: 3
While performing background checks on new employees, which of these can NEVER be an attribute for
discrimination?
Options
Q: 4
Which are the components of an incident response plan?
Options
Q: 5
Which of the following documents outlines the specific step-by-step instructions to achieve a task or process?
Options
Q: 6
What kind of attack is likely to occur when a hacker intercepts and redirects traffic by spoofing the IP
address of a corporate server?
Options
Q: 7
Which of the following is a PRIMARY objective of implementing physical access controls in an
organization?
Options
Q: 8
What cloud service provides the highest level of flexibility and customization for the organization?
Options
Q: 9
What is the PRIMARY purpose of encryption?
Options
Q: 10
Which of these terms refers to threats with unusually high technical and operational sophistication,
spanning months or even years?
Options
Question 1 of 10