M4: Quizzes Flashcards
- All of the following are components of a cybersecurity strategy, EXCEPT:
A. Recover
B. Respond
C. Implementation
D. Identify
C. Implementation
Text, pg 156
Data breaches cost organizations on average __________million dollars.
A. 3.8
B. 5.9
C. 4.7
D. 3.5
B. 5.9
Text pg 118
______ is information that can be used to distinguish or trace an individual’s identity.
A. PHI
B. PIH
C. PII
D. IPI
C. PII
Study guide pg 6, learning outcome 1.3(a); text pg 135-136
Section ________of ERISA generally requires a fiduciary to discharge their duties with respect to a plan solely in the interest of the participants and beneficiaries.
A. 304(a)
B. 404(b)
C. 404(a)
D. 344(a)
C. 404(a)
Study guide pg 7, learning outcome 1.5; text pg 118
______________ is when cybercriminals encrypt and seize an entire hard drive and will only release it for a high ransom.
A. Phishing
B. Ransomware
C. Wire transfer email fraud
D. Malware via external devices
B. Ransomware
Study guide pg 8, learning outcome 2.1; text pg 133
All of the following are data breaches that a government agency identified as having occurred with retirement plans, EXCEPT:
A. Failure to install security system updates
B. An email hoax (phishing attack)
C. Social Security numbers mailed to wrong addresses
D. Using different passwords for multiple clients
D. Using different passwords for multiple clients
Study guide pg 9, learning outcome 2.2; text pg 119
_____specifies rules for business associate agreements that plan sponsors enter with TPAs and other service providers.
A. HIPAA
B. FTC
C. ERISA
D. GMR
A. HIPAA
Study guide pg 11, learning outcome 3.2; text pg 136
Under the terms of the GMR settlement with the FTC, the settlement will remain in force for the next ________ years.
A. Five
B. Ten
C. Twenty
D. Fifteen
C. Twenty
Study guide pg 12, learning outcome 3.5; text pg 122
The DOL issued ________pieces of subregulatory guidance addressing cybersecurity practices.
A. Three
B. Five
C. Two
D. Six
A. Three
Study guide pg 18, learning outcome 5.1; text pg 165
All of the following are examples of data breaches with medical plans, EXCEPT:
A. Encrypted information on laptops
B. Failure to implement physical safeguards at workstations
C. Return of photocopiers without erasing data contained on hard drives
D. Lost documents with PHI
A. Encrypted information on laptops
Study guide pg 9, learning outcome 2.3; text pg 119
Employee benefit plans are susceptible to cyber
attacks, identity theft, and other forms of data
malfeasance due to the lack of personal and
identifiable information.
True or False?
False
PII stands for Personally Identifiable Information.
True or False?
True
Phishing is where fraudulent e-mails are sent with the objective of enticing the user to interact and inadvertently provide an avenue for a cybercriminal to infiltrate a computer network.
True
The Gramm-Leach-Bliley Act controls the ways financial institutions deal with private information of individuals.
True
An example of a non-commercial contracting issue that a service provider contract should address is that a plan service provider’s auditing requirements must be specified.
True
PHI is defined as information that is a subset of health information, including demographic information collected from an individual.
True
A plan fiduciary should assume that service providers will handle all compliance obligations.
False
Ransomware is where cybercriminals encrypt and seize a hard drive and will only release it for a high ransom.
True
One of the data breaches that a government agency has identified as having occurred with retirement plans is the failure to install security system updates.
True
The FTC is requiring companies to take steps to verify and monitor that data-related service providers are adequately protecting the information.
True
The acronym PII stands for _________________.
A. Personally indicated information
B. Probably identifiable information
C. Probably indicated information
D. Personally identifiable information
D. Personally identifiable information
Text pg 135
Ransomware is a type of cyber threat that is defined as __________.
A. When cybercriminals do not encrypt data
B. Data that be released for a high ransom
C. Data that will be released for a low ransom
D. When cybercriminals encrypt, but do no seize hard drives
B. Data that be released for a high ransom
Text pg 161
The Gramm-Leach-Bliley Act was enacted to ____________.
A. Meet DOL guidelines
B. Control the way financial institutions deal with private information of individuals
C. Meet HIPAA guidelines
D. Provide fair credit reporting
B. Control the way financial institutions deal with private information
Text pg 163
Which of the following is a U.S. governmental organization that has published a cybersecurity framework to set voluntary standards and best practices for managing cybersecurity risks to critical infrastructure services?
A. RIST
B. MIST
C. NIST
D. GIST
C. NIST
Text pg 161