Quiz 2 Prin and Prac

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which Nmap switch would attempt to guess a target host's operating system?

-O

Rodrigo is a security professional. He is creating a policy that gives his organization control over mobile devices used by employees while giving them some options as to the type of device they will use. Which approach to mobile devices is Rodrigo focusing on in the policy?

Choose Your Own Device (CYOD)

You should enumerate recommended mitigations or next steps in this section of a formal Penetration Test Report.

Conclusion section

A hacker has stolen logon IDs and passwords. The hacker is now attempting to gain unauthorized access to a public-facing web application by using the stolen credentials one by one. What type of attack is taking place?

Credential harvesting

True or False? A phishing attack "poisons" a domain name on a domain name server (DNS).

False

The Common Vulnerabilities and Exposures (CVE) list is maintained by the ________ and, together with the NVD, provides information about vulnerabilities and how to ________ them with software patches and updates.

MITRE Corporation; mitigate

Which of the following is an example of a reactive disaster recovery plan?

Moving to a warm site

Zenmap and Nessus can identify devices, operating systems, applications, database servers, and services on those devices. Which of the two applications can also identify known vulnerabilities or bugs on the devices being scanned?

Only Nessus

A hospital is planning to introduce a new point-of-sale system in the cafeteria that will handle credit card transactions. Which one of the following governs the privacy of information handled by those point-of-sale terminals?

Payment Card Industry Data Security Standard (PCI DSS)

A Nessus scan report identifies vulnerabilities by a ________.

Plugin ID

In OpenVAS, the ________ measures how reliable a vulnerability's severity score is.

QoD score

What term describes the risk that exists after an organization has performed all planned countermeasures and controls?

Residual risk

This section of a formal Penetration Test Report defines the restrictions on the aggressiveness of a penetration test, describes the methods that a pen tester will use to reach a target, and provides a list of the planned/executed tests.

Scope section

The ________ allows you to tailor the thoroughness of a vulnerability scan and can affect whether a scan is quick or longer.

assessment option in Nessus

True or False? An uninterruptible power supply (UPS) is an example of a reactive component of a disaster recovery plan (DRP).

false

True or False? Corrective controls are implemented to address a threat in place that does not have a straightforward risk-mitigating solution.

false

True or False? Regarding data-center alternatives for disaster recovery, a mobile site is the least expensive option but at the cost of the longest switchover time.

false

Which Nmap command would you run to execute a Ping scan on all hosts on the 172.30.0.0/24 subnet?

nmap -T4 -A -v 172.30.0.0/24

Aditya is the security manager for a mid-sized business. The company has suffered several serious data losses when laptops were stolen. Aditya decides to implement full disk encryption on all laptops. What risk response did Aditya take?

reduce

Which term describes an action that can damage or compromise an asset?

threat

True or False? Corrective controls are implemented to address a threat in place that does not have a straightforward risk-mitigating solution.

true

True or False? Mobile device management (MDM) includes a software application that allows organizations to monitor, control, data wipe, or data delete business data from a personally owned device.

true

True or False? OCTAVE is an approach to risk-based strategic assessment and planning.

true

True or False? Safeguards address gaps or weaknesses in the controls that could otherwise lead to a realized threat.

true

True or False? The term "risk management" describes the process of identifying, assessing, prioritizing, and addressing risks.

true

True or False? The tools for conducting a risk analysis can include the documents that define, categorize, and rank risks.

true

True or False? Theft of intellectual property and its release to competitors or to the public can nullify an organization's competitive advantage.

true

True or False? Transmitting private or sensitive data unencrypted is a risk in both the Local Area Network (LAN) and Wide Area Network (WAN) Domains of a typical IT infrastructure.

true

True or False? When servers need operating system upgrades or patches, administrators take them offline intentionally so they can perform the necessary work without risking malicious attacks.

true

A ________ is limited to the scanning and enumeration phase of the cyber kill chain, while a ________ encompasses the full kill chain.

vulnerability assessment; penetration test


संबंधित स्टडी सेट्स

CHAPTER 1 Market-Oriented Perspectives Underlie Successful ...

View Set

Anatomy & Physiology I FINAL EXAM REVIEW

View Set

Spanish Girl Cousin, Aunt and Niece

View Set