Cybersecurity Assessment

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What validates the integrity of data files?

Hashing

what is the term for the policies and technologies implemented to protect, limit, monitor, audit, and govern identities with access to sensitive data and resources?

Identity and access management (IAM)

According to the shared responsibility model, which cloud computing model places the most responsibility on the cloud service provider (CSP)?

Platform as a Service (PaaS)

Which option removes the risk of multitenancy in cloud computing?

Private Cloud

Which option describes the best defense against collusion?

Separation of duties and job rotation

Packet sniffer is also called _

protocol analyzer

Which option describes testing that individual software developers can conduct on their own code?

unit testing

Which area is DMZ?

2

Which security control can best protect against shadow IT by identifying and preventing use of unsanctioned cloud apps and services?

Cloud Access Security Broker (CASB)

Which option tests code while it is in operation?

Dynamic Analysis

In black box penetration testing, what information is provided to the tester about the target environment?

None

Which aspect of cybersecurity do Distributed Denial of Service (DDoS) attacks affect the most?

Availability

Which is an example of privacy regulation at the state government level in the U.S.?

CCPA

You need to recommend a solution to automatically assess your cloud-hosted VMs against CIS benchmarks to identify deviations from security best practices. What type of solution should you recommend?

Cloud Security Posture Management (CSPM)

What is the difference between DRP and BCP?

DRP works to keep a business up and running despite a disaster. BCP works to restore the original business capabilities.

Your organization recently implemented a unified messaging solution and VoIP phones on every desktop. You are responsible for researching the vulnerabilities of the VoIP system. Which type of attack are VoIP phones most vulnerable to experiencing?

Denial of Service (DoS)

Which security control cannot produce an active response to a security event?

Intrusion Detection System (IDS)

During a penetration test, you find a file containing hashed passwords for the system you are attempting to breach. Which type of attack is most likely to succeed in accessing the hashed passwords in a reasonable amount of time?

Rainbow Table Attack

You configure an encrypted USB drive for a user who needs to deliver a sensitive file at an in-person meeting. What type of encryption is typically used to encrypt the file?

Symmetric Encryption


Ensembles d'études connexes

2) Alzheimers: Amyloid plaque formation

View Set

Chapter 3: Biology and Behavior Psych 2400

View Set

Ch 41 Upper GI Problems Questions

View Set

Learning curve questions unit IV- AP PSYCH

View Set

Government Regulation & Consumer Protection

View Set