Incorrect! You Got It Wrong: Scroll To Next Question
Incorrect! You Got It Wrong: Scroll To Next Question
rootkit
Rate this question:
APTs typically originate from sources such as organized crime groups, activists
or goverments
APTs use obfuscation techniques that help them remain undiscovered for
months or even years
APTs are often long term, multi phase projects with a focus on reconnaissance
The APT attack cycle begins with target penetration an collection of sensitive
information
Although they are often associated with APTs, intelligence agencies are rarely
the perpetrators of APT attacks
Rate this question:
10
Incorrect! Review it
Select all that apply. The internet perimeter should:
payload
Rate this question:
10
firewall
Rate this question:
10
Incorrect! Review it
Choose three. There key benefits of the DMZ system are:
Correct! Bravo
Virtualization involves:
Correct! Great
Match.
The well-known ports
Correct
Correct
Rate this question:
Vulnerability scanning
Penetration testing
Incorrect! Uh-oh!
Which of the following cybersecurity roles is charged with the
duty of managing incidents and remediation?
Board of directors
Executive committee
Cybersecurity management
Cybersecurity practitioners
Rate this question:
10
Correct! Bravo
Three common controls used to protect the availability of
information are:
patches
Rate this question:
11
Correct! Wow
System hardening should implement the principle of __________ or
____________ .
Governance, compliance
Correct!
Unlike the IDS, which simply sends an alert when an attack is
happening, the IPS can actually help block the attack.
True
False
Rate this question:
30
Correct! Nice
The _________ layer of the OSI model ensures that data are
transferred reliably in the correct sequence, and the _________
layer coordinates and manages user connections.
Transport, session
Physical, application
Correct! Super
The ________ functions as a small, isolated network for an
organization's public servers, VPN termination and modem pools.
Demilitarized zone
Correct! Wow
_____, also called malicious code, is software designed to gain
access to targeted computer systems, steal information or
disrupt computer operations.
malware
Correct answer(s):
malware
Rate this question:
10
Incorrect! Oops!
_____ provides details on how to comply with policies and
standards.
guidelines
Correct answer(s):
procedures
Rate this question:
01
attack vector
Rate this question:
Correct! Great
A _____ is a weakness in the design, implementation, operation or
internal controls in a process that could be exploited to violate the
system security.
vulnerability
Correct answer(s):
vulnerability
Rate this question:
Disaster
Event
Threat
Incident
Rate this question:
02
Correct!
Match.
ingress
Correct
egress
Correct
Rate this question:
11
Incorrect! Sorry!
_____ provides general guidance and recommendations on what
to do in particular circumstances.
guideline
Correct answer(s):
guidelines
Rate this question:
The protection of paper documents, digital and intellectual property, and verbal
or visual communications
Correct
Correct
Rate this question:
Incorrect! Sorry!
_____ includes many components such as directory services,
authentication and authorization services, and user management
capabilities such as provisioning and deprovisioning.
IAM
Correct answer(s):
identity management
Rate this question:
02
Correct! Nice
The number and types of layers needed for defense in depth are a
function of:
Correct!
Select three. The chain of custody contains information
regarding:
Proof that the analysis is based on copies identical to the original evidence
Incorrect! Review it
Select all that apply. A business impact analysis (BIA) should
identify:
Which types of data backups (full, incremental and differential) will be used.
Rate this question:
1 18
threat
Rate this question:
10
Preparation
Identification
Containment
Eradication
Rate this question:
Correct!
Most OS have two modes of operations - ________ for execution of
privileged instructions for the internal operation of the system
and _________ for normal activities.
asset
Rate this question:
Incorrect! Sorry!
_____ is sued to interpret policies in specific situations.
d
Correct answer(s):
standards
Rate this question:
10
Correct! Nice
_________ is defined as " a model for enabling convenient, on-
demand network access to a shared pool of configurable
resources (e.g., networks, servers, storage, applications and
services) that can be rapidly provisioned and released with
minimal management or service provider interaction."
Cloud computing
Big data
LAN
Rate this question:
10
policies
Rate this question:
10
Incorrect! Oops!
Select all that apply. Which of the following are considered
functional areas of network management as defined by ISO?
Accounting management
Fault management
Firewall management
Performance management
Security management
Rate this question:
Correct
Data Link
Correct
Network Layer
Missed
Correct Answer: Translates network addresses and routes data from sender to receiver
Transport Layer
Correct
Session Layer
Correct
Presentation Layer
Incorrect
Correct Answer: Formats, encrypts and compresses data
Application Layer
Correct
Rate this question:
21
Correct! Wow
Choose three. Which types of risk are typically associated with
mobile devices?
Organizational risk
Compliance risk
Technical risk
Physical risk
Transactional risk
Rate this question:
10
Incorrect! Review it
What is the correct order of the incident response process?
Correct! Wow
Choose three. According to the NIST cybersecurity framework,
which of the following are considered key functions necessary for
the protection of digital assets?
Encrypt
Protect
Investigate
Recover
Identify
Rate this question:
10
Incorrect! Uh-oh!
Choose three. The SDLC includes:
An objective for each phase of the life cycle that is typically described with key
deliverables, a description of recommended tasks and a summary of related
control objectives for effective management.
Incremental steps or deliverables that lay the foundation for the next phase
Incorrect! Uh-oh!
The core duty of cybersecurity is to identify, mitigate, and manage
_____ to an organization's digital assets.
threat
Correct answer(s):
cyberrisk
Rate this question:
02
VLAN
Rate this question:
02