CYBERSECURITY COURSE QUIZ
1. The most appropriate definition of Cyberspace is:
a) The origin of Cyber Attacks
b) A virtual place for virtual applications
c) A virtual place for virtual applications used by virtual
people
d) None of the above
Answer: c
2. The role of the standard ISO 27032 may be described as:
a) A tool for the definition of a cybersecurity strategy and
management
b) Guideline for cybersecurity choice of security controls
c) A valid alternative for the identification of
cybersecurity risk sources
d) All of the above
Answer: d
3. The integration between NIST and ISO 27032 may be
demonstrated by:
a) The use of the same terminology
b) Both standards describe a framework for cybersecurity
implementation
c) The security controls objectives are similar.
d) They have the same number of procedures to be
implemented
Answer: b
4. What are the objectives of protection on Cyberspace
according to ISO 27032?
a) Protection of information and data
b) Protection of databases and related applications
c) Protection of privacy data
d) Protection of confidentiality, integrity and availability.
Answer: d
5. What must be the priorities of asset protection in
Cyberspace?
a) Applications, communications and data
b) Applications, data and software development
c) Applications, communication, access control and
people
d) Applications, communication, access control
Answer: c
6. Crime activities on Cyberspace are monitored by:
a) Local Government
b) FBI and Interpol
c) Nobody
d) Darknet
Answer: b
7. Identify risk sources on Cyberspace:
a) People
b) Virtual devices and avatars
c) Offices
d) Darknet
Answer: d
8. What is the most effective technique to manage access
control in Cyberspace?
a) Not allow access at all
b) The use of local signon
c) The use of single signon
d) Use of encryption
Answer: c
9. Select which will the most effective technique to ensure
non-repudiation on networks:
a) The use of IPSec
b) The use of redundant devices
c) The use of encryption
d) The use of digital signatures
Answer: d
10. The security control A.14.2.7 — Outsourced
development security May be implemented by:
a) Using a CCMi framework
b) Using a Scrum framework
c) Implementing ISO 27001 policies, processes and
procedures
d) Implementing ISO 27034
Answer: d
11. Data breach is an attack vector that can use:
a) An SQL injection technique
b) A physical theft of information
c) Broken passwords
d) All of the above
Answer: d