Cybersecurity thing
Who has the greatest influence over access security in a password authentication environment?
Users
Where should an organization's network terminate virtual private network (VPN) tunnels?
At the perimeter, to allow for effective internal monitoring
Business continuity plans (BCPs) associated with organizational information systems should be developed primarily on the basis of:
Business needs
An interoperability error is what type of vulnerability?
Emergent
During which phase of the six-phase incident response model is the root cause determined?
Eradication
What kind of anti-malware program evaluates system processes based on their observed behaviors?
Heuristic
Virtual systems should be managed using a dedicated virtual local area network (VLAN) because:
Insecure protocols could result in a compromise of privileged user credentials
Under the US-CERT model for incident categorization, a CAT-3 incident refers to which of the following?
Malicious code
A passive network hub operates at which layer of the OSI model?
Physical
Which of the following interpret requirements and apply them to specific situations?
Standards
Which two factors are used to calculate the likelihood of an event?
Threat and vulnerability