Security Administration Module 1 and 2 Quiz

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What is the dark web?

It is part of the internet that can only be accessed with special software.

An employee connects wirelessly to the company network using a cell phone. The employee then configures the cell phone to act as a wireless access point that will allow new employees to connect to the company network. Which type of security threat best describes this situation?

rogue access point

What type of cyberwarfare weapon was Stuxnet?

worm

which regulatory law regulates the identification, storage, and transmission of patient personal healthcare information?

HIPAA

A worker in the records department of a hospital accidentally sends a medical record of a patient to a printer in another department. When the worker arrives at the printer, the patient record printout is missing. What breach of confidentiality does this situation describe?

PHI

An SOC is searching for a professional to fill a job opening. The employee must have expert-level skills in networking, endpoint, threat intelligence, and malware reverse engineering in order to search for cyber threats hidden within the network. Which job within an SOC requires a professional with those skills?

Threat Hunter

Which KPI metric does SOAR use to measure the time required to stop the spread of malware in the network?

Time to Control

How does a security information and event management system (SIEM) in a SOC help the personnel fight against security threats?

by combining data from multiple technologies

When a user turns on the PC on Wednesday, the PC displays a message indicating that all of the user files have been locked. In order to get the files unencrypted, the user is supposed to send an email and include a specific ID in the email title. The message also includes ways to buy and submit bitcoins as payment for the file decryption. After inspecting the message, the technician suspects a security breach occurred. What type of malware could be responsible?

ransomware

Which three are major categories of elements in a security operations center? (Choose three.)

technologies processes people


संबंधित स्टडी सेट्स

C810 Quiz & Check Your Understanding

View Set

BC - Ch 7 - Hemoglobin and Myoglobin

View Set

corrections final chapters 13-14

View Set

Chapter 16 Neuro/Mental Status Alterations

View Set

[Lección 5] Estructura 3.3 - En el hotel

View Set

AH Exam 1: Chapter 22, Ch 22: Management of Patients with Upper Respiratory Tract Disorders, Chapter 22: Management of Patients With Upper Respiratory Tract Disorders

View Set