Link to Register Free Courses of CISA
On Completion of this Course you will get Certificate
Answers are below: ✌
Critical Infrastructure 10:
Infrastructure refers to the underlying structure that allow a society to function.
A. True
Critical Infrastructure 20:
Which of the following are examples of critical infrastructure?
C. Power plants, dams, water supply, bridges, etc.
Critical Infrastructure 30:
Which of the following is the lead agency for coordinating cyber incident protection, prevention, mitigation, and recovery?
A. Department of Homeland Security
Cybersecurity 10:
To various degrees, all critical infrastructure sectors depend on information technology.
A. True
Cybersecurity 20:
Which of the following is an example of cybersecurity measures?
D. All of the above
Cybersecurity 30:
The computers controlling major U.S. industry operations were threatened over __ times during the course of a recent year.
D. 200
Security and Resilience 10:
Which document “advances a national unity of effort to strengthen and maintain secure, functioning, and resilient critical infrastructure”?
B. Presidential Policy Directive 21
Security and Resilience 20:
The 2013 National Infrastructure Protection Plan has a greater focus on critical infrastructure owners and operators take responsibility for their own cybersecurity.
B. False
Security and Resilience 30:
Under PPD 21, which agency was charged with working with private sector, research, academic, and government organizations to improve technology and tools related to cybersecurity systems?
Wrong Answer: Department of Homeland Security
Improving Cybersecurity 10:
Which document is intended to “enhance the security and resilience of the Nation’s critical infrastructure and to maintain a cyber environment that encourages efficiency, innovation, and economic prosperity while promoting safety, security, business confidentiality, privacy, and civil liberties”?
A. Executive Order 13636
Improving Cybersecurity 20:
Which of the following is NOT an area the C3 Voluntary Program focuses on?
Wrong Answer A. Use
Improving Cybersecurity 30:
The Department of Homeland Security’s Enhanced Cybersecurity Services (ECS) program is an intrusion prevention capability that helps U.S.-based companies protect their computer systems against which of the following?
B. Exploitation
NCCIC 10:
Which of the following is NOT an organization that the NCCIC regularly coordinates synchronized response, mitigation, and recovery effort with when there is an event of significant cyber or communications incidents?
Wrong answer C. International computer emergency readiness teams
NCCIC 20:
One critical component of the NCCIC is the Automated Indicator Sharing (AIS) capability, which is available for free and allows the Federal government and private sector to share information on cyber threat indicators.
A. True
NCCIC 30:
The NCCIC provides a secure, collaborative system to share sensitive cybersecurity prevention, protection, mitigation, response, and recovery information with validated private sector, government, and international partners. This system is:
B. Web-based
