Cyber 342W Chapter 1-6 Quiz Question Practice

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

In contingency planning, a(n) _________ that threatens the security of the organization's information is called an _________. Adverse event; incident Incident; adverse event Hard time; adverse event Hard time; incident

Adverse event; incident

In an organization, unexpected events occur periodically; these are referred to as ___________. Hard times Adverse events Exploits Incidents

Adverse events

At the end of every test, exercise, or assessment function, the group should assume for an ______. Hotwash Debriefing Structured Review After Action Review

After Action Review

What is the rule of three? Never update all three of your servers simultaneously Three people should always be on call for every organization in case of emergency An organization should keep three levels of computer systems available An organization should keep three levels of computer systems unavailable

An organization should keep three levels of computer systems available

The _____ approach focuses on the identification and apprehension of the intruder with additional attention given to the collection and preservation of evidentiary materials that might support administrative or criminal prosecution. Apprehend and Prosecute Name and Shame Dox Protect and Forget

Apprehend and Prosecute

A ____ is a document that describes how, in the event of a disaster, critical business functions continue at an alternate location while the organization recovers its ability to function at the primary site. Business Continuity Plan Risk Assessment Plan Incident Response Plan Disaster Recovery Plan

Business Continuity Plan

A _______ is an investigation and assessment of the impact that various events or incidents can have on the organization. Business Impact Analysis Event Recovery Analysis Risk Assessment Vulnerability Assessment

Business Impact Analysis

A task performed by an organization or organizational subunit in support of the organization's overall mission. Recovery Process Recovery Operations Business Operations Business Process

Business Process

The ____ illustrates the most critical characteristics of information and has been the industry standard for computer security since the development of the mainframe. CIA Triangle Disaster Recovery Plan Strategic Plan Asset Clarification

CIA Triangle

In some organizations, the ______ may simply be a loose or informal association of IT and InfoSec staffers who are called up if an attack on the organization's information assets is detected. SOC Red Team CSIRT IRP Team

CSIRT

The CISO should select members from each community of interest to form the _______ that will execute the IR plan. SOC SIRT IRP Team CSIRT

CSIRT

_________ is a a set of people, policies, procedures, technologies, and information necessary detect, react, and recover from an incident that could potentially result in unwanted modification, damage, destruction, or disclosure of the organization's information. Red Team CSIRT IRP Team SOC

CSIRT

When the measured activity is outside the previously-known-good parameters in a behavior-based IDPS, it is said to exceed the ____ (the level at which the IDPS triggers an alert to notify the administrator). Baseline Level Footprint Level Clipping Level Root Level

Clipping Level

A(n) _____ is the collection of individuals responsible for the overall planning and development of the contingency planning process, including the organization of subordinate teams and oversight of subordinate plans. Contingency Planning Management Team Champion Management of Contingency Planning Team Senior Management Team

Contingency Planning Management Team

In an attack known as ____, valid protocol packets exploit poorly configured DNS servers to inject false information to corrupt the servers' answers to routine DNS queries from other systems on that network. Denial of Service DNS Cache Poisoning Port Mirroring Evasion

DNS Cache Poisoning

____ are used for recovery from disasters that threaten on-site backups. Data Backups Data Archives RAID systems Electronic Vaulting Sites

Data Archives

____ __ sometimes referred to as avoidance) is the risk control strategy that attempts to prevent the exploitation of a vulnerability. Defense Acceptance Transference Mitigation

Defense

A ____ attack seeks to prevent legitimate users access to services by either tying up a server's available resources or causing it to shut down. Denial of service Trojan Horse Social Engineering Spyware

Denial of service

A(n) ____ backup only archives the files that have been modified since the last full backup. Copy Differential Incremental Daily

Differential

A valid attack is classified as an information security incident when it has all of the following: Directed against information assets owned or operated by the organization Realistic chance of success Threatens the confidentiality, integrity, or availability of information resources and assets Data exfiltration from the target network

Directed against information assets owned or operated by the organization Realistic chance of success Threatens the confidentiality, integrity, or availability of information resources and assets

A ____ deals with the preparation for and recovery from a disaster, whether natural or man-made. Disaster Recovery Plan Mitigation Plan Risk Management Plan Risk Assessment Plan

Disaster Recovery Plan

An organization aggregates all local backups to a central repository and then backs up that repository to an online vendor, with a ____ backup strategy. Disk-to-Disk-to-Tape RAID Differential Disk-to-Disk-to-Cloud

Disk-to-Disk-to-Cloud

Which of the following is not part of the BIA? IT Application Logs Production Schedules Financial Reports Employees' Schedules

Employees' Schedules

Because CSIRT opportunities are typically ancillary to the CSIRT member's day-to-day job, managers don't need to worry about burnout. True False

False

Most organizations will find themselves awash in incident candidates at one time or another, and the vast majority will be ____. System Crashes Unusual Definite Indicators Reported Attacks False Positives

False Positives

If an intruder can ____ a device, then no electronic protection can deter the loss of information. Packet Sniff Trap and Trace Log and Monitor Have Physically Access

Have Physically Access

____ are closely monitored network decoys serving that can distract adversaries from more valuable machines on a network; can provide early warning about new attack and exploitation trends; and can allow in-depth examination of adversaries during and after exploitation. Packet Exchangers Trap and Trace Systems Log File Monitors Honeypots

Honeypots

A ____ is a synonym for a virtualization application. Virtual Machine Host Platform Virtual Hardware Hypervisor

Hypervisor

When using virtualization, it is commonplace to use the term ____ to refer to the system that provides a virtualized environment in or on a host platform. Host Machine Hypervisor VMware Virtual Machine

Hypervisor

The ______ is a CSIRT team member, other than the team leader, who is currently performing the responsibilities of the team leader in scanning the organization's information infrastructure for signs of an incident. IR Watch Officer Team leader CSIRT Overlord IR Duty Officer

IR Duty Officer

The two ways to evaluate CSIRT effectiveness are: IR plan tests and war games War games and annual reviews IR plan tests and CSIRT performance measures CSIRT performance measures and war games

IR plan tests and CSIRT performance measures

Effective Contingency Planning should contain all of the following except: Introductory statement of philosophical prospective Identification of key pieces of hardware to recover Statement of scope and purpose of the CP operations A call for periodic ri

Identification of key pieces of hardware to recover

A(n) ___________ is a detailed set of processes and procedures that anticipate, detect, and mitigate the effects of an unexpected event that might compromise information resources and assets. Incident Response Plan Business Continuity Plan Disaster Recovery Plan Continuity of Operations Plan

Incident Response Plan

_______ is a set of procedures that commence when an incident is detected. Incident detection Response to incidents Incident response Continuity of operations

Incident response

A(n) ____ is a sign that an adverse event is underway and has a probability of becoming an incident. Signal Indication Precursor Inactive System

Indication

What is the number one budgetary expense for disaster recovery? Hardware Insurance Secondary location Employee overtime

Insurance

Information assets have ____ when they are not exposed (while being stored, processed, or transmitted) to corruption, damage, destruction, or other disruption of their authentic states. Integrity Risk Assessment Availability Confidentiality

Integrity

Represents the total amount of time the system owner/authorizing official is willing to accept for a mission/business process outage or disruption and includes all impact considerations. Recovery Point Objective Minimum Tolerable Downtime Recovery Time Objective Maximum Tolerable Downtime

Maximum Tolerable Downtime

____ is the risk control approach that attempts to reduce the impact caused by the exploitation of vulnerability through planning and preparation. Mitigation Transference Avoidance Acceptance

Mitigation

A backup plan using WAN/VLAN replication and a recovery strategy using a warm site is most suitable for information systems that have ____ priority within an organization. Critical Low High Moderate

Moderate

The ____ of a hub, switch or other networking device is a specially configured connection that is capable of viewing all the traffic that moves through the entire device. IDPS Console TCP/IP Sensor Monitoring Port External Router

Monitoring Port

A ____ is commonly a single device or server that attaches to a network and uses TCP/IP-based protocols and communications methods to provide an online storage environment. Remote Journal Storage Area Network Network-Attached Storage Virtual Machine Monitor

Network-Attached Storage

The ____ is a federal law that creates a general prohibition on the real-time monitoring of traffic data relating to communications. Wiretap Act Electronic Communication Protection Act Pen/Trap Statue Fourth Amendment of the U.S. Constitution

Pen/Trap Statue

Which of the following is not part of IR Plan Testing? Walk Throughs Desk Checking Parallel Testing Penetration Testing

Penetration Testing

A ____ rootkit is one that becomes a part of the system bootstrap process and is loaded every time the system boots. User Mode Kernel Mode Memory Based Persistent

Persistent

A(n) ____ is a plan or course of action used by an organization to convey instructions from its senior management to those who make decisions, take actions, and perform other duties on behalf of the organization. Policy Self-Assessment Business Continuity Plan Residual Risk Mitigation Plan

Policy

A(n) ____ is an extension of an organization's intranet into cloud computing. Public Cloud Private Cloud Application Cloud Community Cloud

Private Cloud

In the ____ approach, the focus is on the defense of the data and the systems that house, use, and transmit it. Set and Forget Apprehend and Prosecute Hack Back Protect and Forget

Protect and Forget

There are multiple philosophies for incident response. On either end of the spectrum are: Protect and Forget; Apprehend and Prosecute Protect and Forget; Hack back Set and Forget; Hack Back Set and Forget; Apprehend and Prosecute

Protect and Forget; Apprehend and Prosecute

____ uses a number of hard drives to store information across multiple drive units. Virtualization Legacy Backups Continuous Database Protection RAID

RAID

The point in time to which lost systems and data can be recovered after an outage as determined by the business unit. Recovery Time Objective Recovery Point Objective Maximum Tolerable Downtime Maximum Recovery Time

Recovery Point Objective

The period of time within which systems, applications, or functions must be recovered after an outage. Minimum Tolerable Downtime Recovery Time Objective Maximum Tolerable Downtime Recovery Point Objective

Recovery Time Objective

A typical CSIRT needs experience in all of the following except: Cryptography Red teaming System administration Network administration

Red teaming

Both data backups and archives should be based on a(n) ____ schedule that guides the frequency of replacement and the duration of storage. Replication Business Resumption Incident Response Retention

Retention

The use of IDPS sensors and analysis systems can be quite complex. One very common applicatio is an open source software program called ____, which runs on a UNIX or Linux system that can be managed and queried from a desktop computer using a client interface. Snort Detector Match Sniff

Snort

A(n) ____ is an object, person, or other entity that is a potential risk of loss to an asset. Threat Payload Trojan Horse Data Repository

Threat

The term ____ refers to a broad category of electronic and human activities in which an unauthorized individual gains access to the information an organization is trying to protect. Trespass Theft Polymorphism Denial-of-Service

Trespass

The ____ is/are the circumstances that cause the IR team to be activated and the IR plan to be initiated. Trigger Vulnerability Hackers Threat

Trigger

According to NIST, ________ is an additional service that an IR team might offer. Hacking Desk Checking Vulnerability Assessment Penetration Testing

Vulnerability Assessment

A favorite pastime of information security professionals is ______, which is a simulation of attack and defense activities using realistic networks and information systems, with the exercise of IR plans being an important element. Credential Reuse Hacking Spear Phishing War Gaming

War Gaming


संबंधित स्टडी सेट्स

California Real Estate Practice Final

View Set

Life Insurance Underwriting and Policy Issue

View Set

Operations Management Ch. 6 Pt. 2

View Set

Chapter 3 Social and Mobile Marketing

View Set

Peds ATI Chapter 23 GI Inflammatory Disorders

View Set

Information Systems Multiple Choice Questions (Flash Card mode)

View Set