Security + Mod 2 Quiz

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Active reconnaissance

What is another name for footprinting?

Black box

What penetration testing level name is given to testers who have no knowledge of the network and no special privileges?

Less expensive

Which of the following is NOT an advantage of crowdsourced penetration testing?

PCI DSS

Which of the following is a standard for the handling of customer card information?

Threat actors have already infiltrated our network.

Which premise is the foundation of threat hunting?

Scope

Tilde is working on a contract with the external penetration testing consultants. She does not want any executives to receive spear-phishing emails. Which rule of engagement would cover this limitation?

Lateral movement

When researching how an attack recently took place, Nova discovered that the threat actor, after penetrating the system, started looking to move through the network with their elevated position. What is the name of this technique?

CSA

Which group is responsible for the Cloud Controls Matrix?

SOAR

Which of the following can automate an incident response?

Automated

Which of the following is NOT a characteristic of a penetration test?

Twitter

Which of the following is NOT a general information source that can provide valuable in-depth information on cybersecurity?

They would have to stay overnight to perform the test.

Lykke's supervisor is evaluating whether to use internal security employees to conduct a penetration test. Lykke does not consider this a good idea and has created a memo with several reasons they should not be used. Which of the following would NOT be part of that memo?

Reporting

Which is the final rule of engagement that would be conducted in a pen test?

Planning

Ebba has received a new initiative for her security team to perform an in-house penetration test. What is the first step that Ebba should undertake?

Regulations

Which of the following are developed by established professional organizations or government agencies using the expertise of seasoned security professionals?

ISO 31000

Which ISO contains controls for managing and controlling risk?

Red Team

Linnea has requested to be placed on the penetration testing team that scans for vulnerabilities to exploit them. Which team does she want to be placed on?

Incident response

Which of the following is not something that a SIEM can perform?

Requests for comments (RFCs)

What are documents that are authored by technology bodies employing specialists, engineers, and scientists who are experts in those areas?


Kaugnay na mga set ng pag-aaral

Communications Summer Session 2 Quiz Chapters 1-5

View Set

Principles of Nursing Exam 2 Powerpoint Questions

View Set

ATI Ch 24 Nursing care of newborns

View Set

ISDS 720 - Deming's 14 points for Management

View Set

8.1 Latin American Peoples Win Independence

View Set

Ch 10 - Pt's w/ Chest & Lower Respiratory Tract Disorders

View Set

Chairman Mao quotes (truer words can never be spoken)

View Set

Theory Exam 3, Brunner Chapter 65 and 66

View Set