Chapter 2 - Q

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which ISO contains controls for managing and controlling risk? a. ISO XRS b. ISO 31000 c. ISO 271101 d. ISO 27555

b. ISO 31000

Tilde is working on a contract with the external penetration testing consultants. She does not want any executives to receive spear-phishing emails. Which rule of engagement would cover this limitation? a. Scope b. Exploitation c. Targets d. Limitations and exclusions

a. Scope

Which of the following is not a general information source that can provide valuable in-depth information on cybersecurity? a. Twitter b. Conferences c. Local industry groups d. Vendor websites

a. Twitter

Which of the following is NOT an advantage of crowdsourced penetration testing? a. Faster testing b. Less expensive c. Ability to rotate teams d. Conducting multiple tests simultaneously

b. Less expensive

Ebba has received a new initiative for her security team to perform an in-house penetration test. What is the first step that Ebba should undertake? a. Approval b. Budgeting c. Planning d. Documentation

c. Planning

What are documents that are authored by technology bodies employing specialists, engineers, and scientists who are experts in those areas? a. Cybersecurity feeds b. White notebooks c. Blue papers d. Requests for comments (RFCs)

d. Requests for comments (RFCs)

Tuva's supervisor wants to share a recent audit outside the organization. Tuva warns him that this type of audit can only be read by those within the organization. What audit does Tuva's supervisor want to distribute? a. SSAE SOC 2 Type II b. SSAE SOC 2 Type III c. SSAE SOC 3 Type IV d. SSAE SOC 3.2 Type X

a. SSAE SOC 2 Type II

Lykke's supervisor is evaluating whether to use internal security employees to conduct a penetration test. Lykke does not consider this a good idea and has created a memo with several reasons they should not be used. Which of the following would NOT be part of that memo? a. The employees could have inside knowledge of the network that would give them an advantage. b. There may be a lack of expertise. c. Employees may have a reluctance to reveal a vulnerability. d. They would have to stay overnight to perform the test.

d. They would have to stay overnight to perform the test.

Which of the following are developed by established professional organizations or government agencies using the expertise of seasoned security professionals? a. Legislation b. White papers c. Regulations d. Benchmarks

c. Regulations

When researching how an attack recently took place, Nova discovered that the threat actor, after penetrating the system, started looking to move through the network with their elevated position. What is the name of this technique? a. Jumping b. Twirling c. Squaring up d. Lateral movement

d. Lateral movement

Linnea has requested to be placed on the penetration testing team that scans for vulnerabilities to exploit them. Which team does she want to be placed on? a. Blue Team b. Purple Team c. White Team d. Red Team

d. Red Team

Which of the following is NOT a characteristic of a penetration test? a. Automated b. Finds deep vulnerabilities c. Performed occasionally d. May use internal employees or external consultants

a. Automated

What penetration testing level name is given to testers who have no knowledge of the network and no special privileges? a. Black box b. Gray box c. White box d. Purple box

a. Black box

Which group is responsible for the Cloud Controls Matrix? a. CSA b. CIS c. OSINT d. NIST

a. CSA

Which of the following can automate an incident response? a. SIEM b. SOAR c. CVCC d. SOSIA

b. SOAR

Which of the following is NOT something that a SIEM can perform? a. User behavior analysis b. Sentiment analysis c. Log aggregation d. Incident response

d. Incident response

Which of the following is a standard for the handling of customer card information? a. DRD STR b. OSS XRS c. RMR CDC d. PCI DSS

d. PCI DSS

What is another name for footprinting? a. High-level reconnaissance b. Active reconnaissance c. Modeling d. Revealing

b. Active reconnaissance

Which premise is the foundation of threat hunting? a. Cybercrime will only increase. b. Threat actors have already infiltrated our network. c. Attacks are becoming more difficult. d. Pivoting is more difficult to detect than ever before.

b. Threat actors have already infiltrated our network.

Which is the final rule of engagement that would be conducted in a pen test? a. Cleanup b. Communication c. Reporting d. Exploitation

c. Reporting


Set pelajaran terkait

Network Auth and Security Chapter 14

View Set

NU 112- Nursing Concepts (REDUCTION OF RISK POTENTIAL)

View Set

Chapter 5 - Canvas Quiz Answers (plus written questions)

View Set

Le Petit Prince: Chapitre 4 Questions

View Set

frl chapter 9, chapter 10, chapter 12

View Set

Driver's Ed Sections 3.7 and 3.8

View Set

Real Estate Ch. 1: The Nature of Real Estate and Real Estate Markets

View Set