Cybersecurity Fundamentals - Practice Test

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

In practical applications:

Asymmetric key encryption is used to securely obtain symmetric keys

Business continuity plans (BCPs) associated with organizational information systems should be developed primarily on the basis of:

Business Needs

Maintaining a high degree of confidence regarding the integrity of evidence requires a(n):

Chain of Custody

Outsourcing poses the greatest risk to an organization when it involves:

Core Business Functions

During which phase of the six-phase incident response model is the root cause determined?

Eradication

Which cybersecurity principle is most important when attempting to trace the source of malicious activity?

Nonrepudiation

The attack mechanism directed against a system is commonly called a(n):

Payload

A cybersecurity architecture designed around the concept of a perimeter is said to be:

System-Centric

Who has the greatest influence over access security in a password authentication environment?

Users

Where should an organization's network terminate virtual private network (VPN) tunnels?

At the perimeter, to allow for effective internal monitoring

A segmented network:

Consists of two or more security zones

A business continuity plan (BCP) is not complete unless it includes:

Detailed Procedures

An interoperability error is what type of vulnerability?

Emergent

What kind of anti-malware program evaluates system processes based on their observed behaviors?

Heuristic

Updates in cloud-computing environments can be rolled out quickly because the environment is:

Homogenous

Virtual systems should be managed using a dedicated virtual local area network (VLAN) because:

Insecure protocols could result in a compromise of privileged user credentials

Under the US-CERT model for incident categorization, a CAT-3 incident refers to which of the following?

Malicious Code

Risk assessments should be performed:

On a regular basis

Securing Supervisory Control and Data Acquisition (SCADA) systems can be challenging because they:

Operate in specialized environments and often have non-standard design elements

A passive network hub operates at which layer of the OSI model?

Physical

During which phase of the system development lifecycle (SDLC) should security first be considered?

Planning

Which of the following interpret requirements and apply them to specific situations?

Standards

A firewall that tracks open connection-oriented protocol sessions is said to be:

Stateful

Which two factors are used to calculate the likelihood of an event?

Threat and Vulnerability

Which of the following offers the strongest protection for wireless network traffic?

Wireless Protected Access 2 (WPA2)


Ensembles d'études connexes

Animals in Research ICEV Assessments I-IV

View Set

Preguntas de Latinos en los EE.UU.

View Set

Soc 1 - Inquizitive Chapter 1 2017

View Set

Psych 21A Ch. 4 Review Questions

View Set

Life Ins. Policy Provisions, Options and Riders (ch.4)

View Set