CSIA105

Ace your homework & exams now with Quizwiz!

What is the advantage of a secure cookie?

a. It is sent to the server over HTTPS.

What are the two concerns about using public information sharing centers?

a. Privacy and speed

Which of the following is NOT an important OS security configuration?

a. Restricting patch management

Which of the following is not an improvement of UEFI over BIOS?

a. Support of USB 3.0

What are the two limitations of private information sharing centers?

b. Access to data and participation

Which of the following is FALSE about a quarantine process?

b. It holds a suspicious application until the user gives approval.

What does Windows 10 Tamper Protection do?

b. Limits access to the registry

Which boot security mode sends information on the boot process to a remote server?

b. Measured Boot

Which stage conducts a test that will verify the code functions as intended?

b. Staging stage

Which of the following is an application protocol for exchanging cyberthreat intelligence over HTTPS?

b. TAXII

Which privacy protection uses four colors to indicate the expected sharing limitations that are to be applied by recipients of the information?

b. TLP

Which of the following is NOT an advantage to an automated patch update service?

b. Users can disable or circumvent updates just as they can if their computer is configured to use the vendor's online update service.

Luka has been asked by his supervisor to monitor the dark web for any IOCs concerning their organization. The next week, Luca reports back that he was unable to find anything due to how looking for information on the dark web is different from using the regular web. Which of the following is not different about looking for information on the dark web?

c. Dark web search engines are identical to regular search engines.

Oskar has been receiving emails about critical threat intelligence information from a public information sharing center. His team leader has asked him to look into how the process can be automated so that the information can feed directly into their technology security. What technology will Oskar recommend?

d. Automated Indicator Sharing (AIS)

What type of analysis is heuristic monitoring based on?

d. Dynamic analysis

Which of the following tries to detect and stop an attack?

d. HIPS

An IOC occurs when what metric exceeds its normal bounds?

d. KRI

Which of the following is NOT a limitation of a threat map?

d. They can be difficult to visualize.

Which model uses a sequential design process?

d. Waterfall model

Which of these is a list of preapproved applications?

d. Whitelist


Related study sets

Wonderlic 25 Question Quick Practice Test

View Set