What is a common drawback or weakness of a vulnerability scanner?
What is a common drawback or weakness of a vulnerability scanner?
A high false-negative error rate | ||
A high false-positive error rate | ||
A low false-negative error rate | ||
A low false-positive error rate |
QUESTION 5
What can be used to ensure confidentiality of sensitive data?
Save your time - order a paper!
Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines
Order Paper NowHashing | ||
Digital signature | ||
Non-repudiation | ||
Encryption |
QUESTION 6
You have identified the MAO for a system. You now want to specify the time required for a system to be recovered. What is this?
Recovery time objectives | ||
Recovery point objectives | ||
Maximum acceptable outage | ||
BIA time |
QUESTION 7
Which element of an incident response plan involves obtaining and preserving evidence?
Preparation | ||
Identification | ||
Containment | ||
Eradication |
QUESTION 8
Of the following, what is critical for any DRP?
Budget | ||
Alternate locations | ||
Third-party backup software | ||
Fuel for generators |
QUESTION 9
Three common controls used to protect the availability of information are:
Redundancy, backups and access controls. | ||
Encryption, file permissions and access controls. | ||
Access controls, logging and digital signatures. | ||
Hashes, logging and backups. |
QUESTION 10
A major disruption has forced you to move operations to an alternate location. The disruption is over and you need to begin normalizing operations. What operations should you move back tothe original location first?
Mission-essential personnel | ||
Most critical business functions | ||
non-mission-essential personnel | ||
Least critical business functions |
QUESTION 11
What type of control is an intrusion detection system (IDS)?
Corrective | ||
Detective | ||
Preventative | ||
Recovery |
QUESTION 12
Vulnerability management begins with an understanding of cybersecurity assests and their locations, which can be accomplished by:
Vulnerability scanning. | ||
Penetration Testing. | ||
Maintaining an asset inventory. | ||
Using command line tools. |
QUESTION 13
Attackers attempt a DoS attack on servers in your organization. The CIRT responds and mitigates the attack. What should be the last step that the CIRT will complete in response to this incident?
Document the Incident. | ||
Contain the threat. | ||
Report the Incident. | ||
Attack the attacker. |
QUESTION 14
You are performing a cost-benefit analysis. You want to determine if a countermeasure should be used.
Which of the following formulas should you apply?
Projected benefits – Cost of countermeasure | ||
Loss before countermeasure – Loss after countermeasure | ||
Loss after countermeasure – Loss before countermeasure | ||
Cost of countermeasure – Projected benefits |
QUESTION 15
A business impact analysis (BIA) includes a maximum allowable outage (MAO). The MAO is used to determine the amount of time in which a system must be recovered. What term is used in the DRP instead of the MAO?
Recovery action item (RAI) | ||
Recovery time objective (RTO) | ||
Critical business function (CBF) | ||
DRP action item (DRPAI) |
QUESTION 16
What determines if an organization is governed by HIPAA?
If employees handle health-related information | ||
If it is a federal agency | ||
If it receives E-Rate funding | ||
It it is registered with the Securities and Exchange commission |
QUESTION 17
A major disruption has forced you to move operations to an alternate location. The disruption is over and you need to begin normalizing operations. You have rebuilt several servers at the primary location. What should you do?
Test the servers for three to five days before bringing them online. | ||
Bring the servers online and turn off the alternate location servers. | ||
Run the servers concurrently with the alternate location for three to five days. | ||
Test the servers and then turn off the servers at the alternate location. |
QUESTION 18
Mission-critical business functions are considered vital to an organization. What are they derived from?
Executive leadership | ||
Critical success factors | ||
Employees | ||
Critical IT resources |
QUESTION 19
Logon identifiers help ensure that users cannot deny taking a specific action such as deleting a file. What is that called?
Non-repudiation | ||
PKI | ||
Encryption | ||
Digital signature |
QUESTION 20
What can you use to determine the priority of countermeasures?
Best guess method | ||
Disaster recovery plan | ||
Threat/vulnerability matrix | ||
Cost-benefit analysis |
QUESTION 21
Which three elements of the current threat landscapes have provided increased levels of access and connectivity, and therefore increased opportunities for cybercrime?
Text messaging, Bluetooth technology and SIM cards | ||
Web applications, botnets and primary malware | ||
Financial gains, intellectual property and politics | ||
Cloud computing, social media and mobile computing |
QUESTION 22
You are considering an alternate location for a DRP You want to use a business location that is already running non-critical business functions as the alternate location. This location has most of the equipment needed. What type of site is this?
Hot site | ||
Warm site | ||
DRP site | ||
Cold site |
QUESTION 23
What management program can be implemented to ensure that the configuration of systems is not modified without formal approval?
Change management | ||
Configuration management | ||
Process analysis | ||
GAP analysis |
QUESTION 24
After an incident has been verified, you need to ensure that it doesn’t spread to other systems. What is this called?
Containment | ||
Incident response | ||
Spread avoidance | ||
Impact and priority calculation |
QUESTION 25
The number and types of layers needed for defense in depth are a function of:
Asset value, criticality, reliability of each control and degree of exposure. | ||
Threat agents, governance, compliance and mobile device policy. | ||
Network configuration, navigation controls, user interface and VPN traffic. | ||
Isolation, segmentation, internal controls and external controls. |
QUESTION 26
What can you do to show that the BCP will work as planned?
BCP exercises | ||
BCP testing | ||
BCP training | ||
BCP planning |
QUESTION 27
What type of approach does a BIA use?
Best-guess approach | ||
Top-down approach where CBFs are examined first | ||
Middle-tier approach | ||
Bottom-up approach where servers or services are examined first |
QUESTION 28
In an attack, the container that delivers the exploit to the target is called what?
Attack vector | ||
Malware | ||
Payload | ||
Rootkit |