Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Implementing a Security Awareness training program would be an example of which type of control? 1 point Operational control Physical control Technical control Administrative control

Implementing a Security Awareness training program would be an example of which type of control?

1 point

Operational control

Physical control

Technical control

Administrative control

2.

Question 2

Requiring all employees to complete annual security awareness training is an example of which type of control?

1 point

Corrective

Deterrent

Administrative

Preventative

3.

Question 3

What would a piece of malicious code that gets installed on a computer and reports back to the controller your keystrokes and other information it can gather from your system be called?

1 point

A virus

A worm

Spyware

A Trojan Horse

4.

Question 4

Implementing a filter to remove flooded packets before they reach the host is a countermeasure to which form of attack?

1 point

A Denial of Service (DoS) attack

An IP Spoofing attack

A Phishing attack

All of the above

5.

Question 5

An email message that is encrypted, uses a digital signature and carries a hash value would address which aspects of the CIA Triad?

1 point

Confidentiality and Integrity

Confidentiality and Availability

Integrity and Availability

Confidentiality, Integrity and Availability

6.

Question 6

Trudy intercepts a romantic plain-text message from Alice to her boyfriend Sam. The message upsets Trudy so she forwards it to Bob, making it look like Alice intended it for Bob from the beginning. Which aspect of the CIA Triad has Trudy violated?

1 point

Confidentiality

Integrity

Availability

All of the above

7.

Question 7

A penetration tester that gains access to a system without permission and then exploits it for personal gain is said to wear what color hat?

1 point

White

Gray

Green

Black

8.

Question 8

What is an advantage symmetric key encryption has over asymmetric key encryption?

1 point

Symmetric key encryption is harder to break than asymmetric key encryption

Symmetric key encryption provides better security against Man-in-the-middle attacks than is possible with asymmetric key encryption

Symmetric key encryption is faster than asymmetric key encryption

Symmetric keys can be exchanged more securely than asymmetric keys

9.

Question 9

Which position is in charge of testing the security and effectiveness of computer information systems?

1 point

Information Security Auditor

Chief Information Officer (CIO)

Information Security Analyst

Information Security Architect

10.

Question 10

Which three (3) roles are typically found in an Information Security organization? (Select 3)

1 point

Security Guard

Finance

Vulnerability Assessor

Chief Information Security Officer (CISO)

Penetration Tester

11.

Question 11

ITIL is best described as what?

1 point

A collection of IT Service Management best practices

Privacy regulations for IT systems

A collection of IT Service Management controls

A framework for the development of information systems audit procedures

12.

Question 12

Alice sends a message to Bob that is intercepted by Trudy. Which scenario describes a confidentiality violation?

1 point

Trudy cannot read it because it is encrypted but allows it to be delivered to Bob in its original form

Trudy changes the message and then forwards it on

Trudy reads the message

Trudy deletes the message without forwarding it

13.

Question 13

What does the "A" in the CIA Triad stand for?

1 point

Architecture

Authenticity

Availability

Accountability

14.

Question 14

Which type of access control is based upon the subject's clearance level and the objects classification?

1 point

Hierarchical Access Control (HAC)

Mandatory Access Control (MAC)

Discretionary Access Control (DAC)

Role Based Access Control (RBAC)

15.

Question 15

Ali must grant access to any individual or group he wants to allow access to the files he owns. Which access control type is in use in Ali's organization?

1 point

Hierarchical Access Control (HAC)

Mandatory Access Control (MAC)

Role Based Access Control (RBAC)

Discretionary Access Control (DAC)

16.

Question 16

If you are setting up a Windows 10 laptop with a 32Gb hard drive, which two (2) file system could you select? (Select 2)

1 point

APFS

HPFS

FAT32

NTFS

17.

Question 17

In a Linux file system, which files are contained in the \bin folder?

1 point

All user binary files, their libraries and headers

Directories such as /home and /usr

Executable files such as grep and ping

Configuration files such as fstab and inittab

18.

Question 18

Which form of Cloud computing combines both public and private clouds?

1 point

Binary cloud

Mixed cloud

Hybrid cloud

Open cloud

Universal cloud

19.

Question 19

Which security concerns follow your workload even after it is successfully moved to the cloud?

1 point

Data security

Disaster Recovery/Business Continuity Planning

Identity and Access Management

Compliance

All of the above

20.

Question 20

Which of the following is a self-regulating standard set up by the credit card industry in the US?

1 point

ISO27000 series

HIPAA

NIST 800-53A

PCI-DSS

GDPR

21.

Question 21

Which two (2) of the following attack types target endpoints?

1 point

SQL Injection

Ad Network

Denial of Service (DoS)

Spear Phishing

22.

Question 22

A good Endpoint Detection and Response system (EDR) should have which three (3) of these capabilities? (Select 3)

1 point

Automatically quarantine noncompliant endpoints

Manage encryption keys for each endpoint

Manage thousands of devices at once

Deploying devices with network configurations

23.

Question 23

Which statement about drivers running in Windows kernel mode is true?

1 point

The Windows Virtual Address Manager protects processes in the kernel from interfering with each others assigned memory space

The Windows Process Director prevents processes running in the kernel from interfering with each others operations

Each process running in kernel mode is assigned its own dedicated virtual address space, so it is safe to load any driver into the kernel for faster execution

Only critical processes are permitted to run in kernel mode since there is nothing to prevent a misbehaving driver from impacting other processes that are also sharing the same memory space

24.

Question 24

In Linux, Bash, tcsh and sh are what?

1 point

Commands

Distros

Shells

Directories

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

The World Wide Web And Databases International Workshop Webdb 98 Valencia Spain March 27 28 1998 Selected Papers Lncs 1590

Authors: Paolo Atzeni ,Alberto Mendelzon ,Giansalvatore Mecca

1st Edition

3540658904, 978-3540658900

More Books

Students also viewed these Databases questions

Question

Discuss the theories that help us understand color vision.

Answered: 1 week ago

Question

a. When did your ancestors come to the United States?

Answered: 1 week ago

Question

d. What language(s) did they speak?

Answered: 1 week ago

Question

e. What difficulties did they encounter?

Answered: 1 week ago