Welcome to People, Process and Operating System Fundamentals for Cybersecurity
Q1) In the video Welcome to People, Process and Operating System Fundamentals for Cybersecurity, Alex mentions especially needing which two (2) technical skills and which two (2) soft skills ?
- Effective Communications and Critical Thinking
- Firewalls and Antivirus
Q2) The statement: “The protection of computer systems from theft or damage to the hardware, software or information on them, as well as from disruption or misdirection of the services they provide.” Is a good definition for what ?
- IT Security
- They seek to improve performance, controls and metrics.
- They help translate the business needs into technical or operational needs.
- They are used to improved controls, methodologies and governance for the IT department.
- CISO, Chief Information Security Officer
- Information Security Architect
- Vulnerability Assessor
- Tools
- People
- Process
- Rework
- Cost
- Quality (defect rate)
- Cycle time
- Service Strategy
- Incident Management
People, Process and Technology
Q1) The process in ITIL where changes are released to an IT environment is called what ?
- Release Management
Q2) Which two (2) processes are operational processes? (Select 2)
- Incident Management
- Change Management
Q3) Which two (2) of these are considered best practices? (Select 2)
- ITIL
- Project Manager methodologies
Q4) Which service management process has the responsibility of understanding the root cause of a problem ?
- Problem Management
Q5) In the video What is IT Security, Elio Sanabria Echeverria put forth a definition that included which factors ?
- All of the above.
Q6) This description belongs to which information security role? “This position is in charge of testing the effectiveness of computer information systems, including the security of the systems and reports their findings.”
- Information Security Auditor
Q7) Which of these statements more accurately conveys what was stated in the video Introduction to Process ?
- As volumes of security alerts and false positives grow, more burden is placed upon Security Analysts & Incident Response teams.
Q8) Continual Process Improvement consists of which four (4) items? (Select 4)
- Process Metrics
- Customer Feedback
- Maturity Assessments
- Financial performance
Q9) Event Management, Incident Management, and Problem Management belong to which ITIL Service Lifecycle Phase ?
- Service Operations
Q10) Maintaining Information Security Policy (ISP) and specific security policies that address each aspect of strategy, objectives and regulations is the part of which ITIL process ?
- Information Security Management
1 Comments
Nice information…very well and clearly explained… Thank you so much for this valuable information…Great work keep doing. Looking for the best cyber security services in Hyderabad at affordable prices contact cyanous software solutions.
ReplyDeleteBest cyber security services in Hyderabad
Best software & web development company in Hyderabad