Question
1) The biggest security flaw in the Internet is: Group of answer choices BGP CIS DDoS DNS 2) Within the generic internet protocol topology, the
1)
The biggest security flaw in the Internet is:
Group of answer choices
BGP
CIS
DDoS
DNS
2) Within the generic internet protocol topology, the _______ layer is the protocol responsible for dictating format of data sent, exactly where it is sent to and maintaining data integrity such as TCP and UDP.
3)
While Congress has remained largely in gridlock on cyber regulation, the following state governments have acted, as noted by the authors of The Fifth Domain:
Group of answer choices
Illinois, New York, Michigan
New York, Florida, California
California, New York, Illinois
Ohio, New York, California
4)
The current U.S. energy grid consists largely of three supplies:
Group of answer choices
Electricity, petroleum, and natural gas
Electricity, petroleum, and nuclear
Electricity, solar, and wind
Electricity, solar, and natural gas
5)
When the Obama administration was unsuccessful passing a bill or using an Executive Order to increase CI cybersecurity, the concept of a nudge was suggested. That nudge was the ______.
6) Engaged after 9/11, the _______ provides a partial federal government financial backstop to the insurance industry in the event of a major terrorist attack that exceeds the financial ability of the insurance industry to respond to claims.
7)
Solutions to ransomware include the following, except for:
Group of answer choices
Keep backups at an off-site location
Keep backups segregated into discrete modules
Keep clean originals of key applications, web pages, etc.
Keep multiple backups of varying ages
8)
The authors of The Fifth Domain proposed a new authentication system for ensure a higher degree of identify protection called:
Group of answer choices
NSTIC
ReallyU
CLEAR
SSNPlus
9)
Any regulation issued by a federal agency gets reviewed by the small, but powerful:
Group of answer choices
OIRA
NCS
CSIS
OMB
10)
Attacks on SCADA networks can be performed at these three different levels:
Group of answer choices
RTU and edge devices, SCADA protocols, network topology
IDS, ICT, RTU
RTU, PLC, SCADA protocols
CodeRed, NIMDA, Slammer
11)
According to the authors of The Fifth Domain, what percent of data breaches involved weak or stolen passwords?
Group of answer choices
70%
80%
75%
65%
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started