Computer Network Technology

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Put the steps of the penetration testing phase into the correct order. Attack Discovery Reporting Planning

3 2 4 1

The following statements about advanced persistent threats (APTs) are true.

APTs use obfuscation techniques that help them remain undiscovered for months or even years. APTs are often long-term, multi-phase projects with a focus on reconnaissance. APTs typically originate from sources such as organized crime groups, activists or governments.

These are considered functional areas of network management as defined by ISO.

Accounting management Security management Fault management performance management

The number and types of layers needed for defense in depth are a function of:

Asset value, criticality, reliability of each control and degree of exposure.

In practical applications:

Asymmetric key encryption is used to securely obtain symmetric keys

Business continuity plans (BCPs) associated with organizational information systems should be developed primarily on the basis of:

Business needs

____________________ is defined as "a model for enabling convenient, on-demand network access to a shared pool of configurable resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management or service provider interaction."

Cloud Computing

These three elements of the current threat landscape have provided increased levels of access and connectivity, and therefore increased opportunities for cyber crime

Cloud computing, social media and mobile computing

A segmented network:

Consists of two or more security zones

Outsourcing poses the greatest risk to an organization when it involves

Core business functions

The Internet perimeter should:

Eliminate threats such as email spam, viruses and worms. Control user traffic bound toward the Internet. Detect and block traffic from infected internal end points. Monitor and detect network ports for rogue activity.

Updates in cloud-computing environments can be rolled out quickly because the environment is:

Homogenous

NIST defines a(n) BLANK as a "violation or imminent threat of violation of computer security policies, acceptable use policies, or standard security practices."

Incident

NIST defines a(n) ________ as a "violation of imminent threat of violation of computer security policies, acceptable use policies, or standard security practices."

Incident

Risk assessments should be performed

On a regular basis

Choose three. The key benefits of the DMZ system are:

Private network addresses arc not disclosed to the Internet. An intruder must penetrate three separate devices. Internal systems do not have direct access to the Internet.

Which of the following interpret requirements and apply them to specific situations?

Standards

A cybersecurity architecture designed around the concept of a perimeter is said to be:

System-centric

A _____ is based on logical rather than physical connections, and thus, it allows great flexibility.

VLAN

Which of the following offers the strongest protection for wireless network traffic?

WPA2

Which element of an incident response plan involves obtaining and preserving evidence?

containment

To which of the following layers of the Open Systems Interconnect (OSI) model would one map Ethernet?

data link

_____, also called malicious code, is software designed to gain access to targeted computer systems, steal information or disrupt computer operations.Word options: Standards, Vulnerability, Guidelines, Attack Vector, Policies, Risk, Threat, Asset, Patches, Identity Management, Malware, Rootkit, Payload, Procedure

malware

_____ are solutions to software programming and coding errors.

patches

_____ are solutions to software programming and coding errors.Word options: Standards, Vulnerability, Guidelines, Attack Vector, Policies, Risk, Threat, Asset, Patches, Identity Management, Malware, Rootkit, Payload, Procedure

patches

In an attack, the container that delivers the exploit to the target is called a(n) _____.Word options: Standards, Vulnerability, Guidelines, Attack Vector, Policies, Risk, Threat, Asset, Patches, Identity Management, Malware, Rootkit, Payload, Procedure

payload

The attack mechanism directed against a system is commonly called a(n):

payload

A passive network hub operates at which layer of the OSI model?

physical

_____ communicate required and prohibited activities and behaviors.Word options: Standards, Vulnerability, Guidelines, Attack Vector, Policies, Risk, Threat, Asset, Patches, Identity Management, Malware, Rootkit, Payload, Procedure

policies

The core duty of cybersecurity is to identify, respond to and manage _____ to an organization's digital assets.Word options: Standards, Vulnerability, Guidelines, Attack Vector, Policies, Risk, Threat, Asset, Patches, Identity Management, Malware, Rootkit, Payload, Procedure

risk

_____ is a class of malware that hides the existence of other malware by modifying the underlying operating system.Word options: Standards, Vulnerability, Guidelines, Attack Vector, Policies, Risk, Threat, Asset, Patches, Identity Management, Malware, Rootkit, Payload, Procedure

rootkit

_____ are sued to interpret policies in specific situations.

standards

A _____ is anything capable of acting against an asset in a manner that can cause harm.

threat

A(n) _____ is anything capable of acting against an asset in a manner that can cause harm.Word options: Standards, Vulnerability, Guidelines, Attack Vector, Policies, Risk, Threat, Asset, Patches, Identity Management, Malware, Rootkit, Payload, Procedure

threat


Ensembles d'études connexes

Customer accounts: Long Margin Accounts

View Set

Microeconomics HW #3 (Chapters 5,6,7)

View Set

infant, child and adolescent nutrition

View Set

Checkpoint: Random Variables 1 and 2

View Set