Cybersecurity Assessment

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which is an example of privacy regulation at the state government level in the U.S.?

CCPA

Which security control can best protect against shadow IT by identifying and preventing use of unsanctioned cloud apps and services?

Cloud Access Security Broker (CASB)

You need to recommend a solution to automatically assess your cloud-hosted VMs against CIS benchmarks to identify deviations from security best practices. What type of solution should you recommend?

Cloud Security Posture Management (CSPM)

What is the difference between DRP and BCP?

DRP works to keep a business up and running despite a disaster. BCP works to restore the original business capabilities.

Your organization recently implemented a unified messaging solution and VoIP phones on every desktop. You are responsible for researching the vulnerabilities of the VoIP system. Which type of attack are VoIP phones most vulnerable to experiencing?

Denial of Service (DoS)

Which option tests code while it is in operation?

Dynamic Analysis

What validates the integrity of data files?

Hashing

what is the term for the policies and technologies implemented to protect, limit, monitor, audit, and govern identities with access to sensitive data and resources?

Identity and access management (IAM)

Which security control cannot produce an active response to a security event?

Intrusion Detection System (IDS)

In black box penetration testing, what information is provided to the tester about the target environment?

None

Q1. According to the shared responsibility model, which cloud computing model places the most responsibility on the cloud service provider (CSP)?

Platform as a Service (PaaS)

Which option removes the risk of multitenancy in cloud computing?

Private Cloud

During a penetration test, you find a file containing hashed passwords for the system you are attempting to breach. Which type of attack is most likely to succeed in accessing the hashed passwords in a reasonable amount of time?

Rainbow Table Attack

Which option describes the best defense against collusion?

Separation of duties and job rotation

You configure an encrypted USB drive for a user who needs to deliver a sensitive file at an in-person meeting. What type of encryption is typically used to encrypt the file?

Symmetric Encryption

Packet sniffer is also called _

protocol analyzer

Which option describes testing that individual software developers can conduct on their own code?

unit testing

Which area is DMZ?

2

Which aspect of cybersecurity do Distributed Denial of Service (DDoS) attacks affect the most?

Availability


Ensembles d'études connexes

Pharm 3: Autonomic Nervous System

View Set

CNA Class: test 5: Chapter 22: The Nervous System

View Set

COMNAVLEGSVCCOMINST 5800.1G, NAVAL LEGAL SERVICE COMMAND (NLSC) MANUAL

View Set

AP Psychology Exam 2021 Practice

View Set

Grade 7- Earth Science Review Section 3.1-3.3

View Set

Multiple choice Geography test 2

View Set

6. Project Integration Management

View Set

Chapter 63: Care of Patients with Problems of the Thyroid and Parathyroid Glands

View Set

Quadratic Functions: Standard Form Quiz

View Set