Cybersecurity thing

Ace your homework & exams now with Quizwiz!

Who has the greatest influence over access security in a password authentication environment?

Users

Where should an organization's network terminate virtual private network (VPN) tunnels?

At the perimeter, to allow for effective internal monitoring

Business continuity plans (BCPs) associated with organizational information systems should be developed primarily on the basis of:

Business needs

An interoperability error is what type of vulnerability?

Emergent

During which phase of the six-phase incident response model is the root cause determined?

Eradication

What kind of anti-malware program evaluates system processes based on their observed behaviors?

Heuristic

Virtual systems should be managed using a dedicated virtual local area network (VLAN) because:

Insecure protocols could result in a compromise of privileged user credentials

Under the US-CERT model for incident categorization, a CAT-3 incident refers to which of the following?

Malicious code

A passive network hub operates at which layer of the OSI model?

Physical

Which of the following interpret requirements and apply them to specific situations?

Standards

Which two factors are used to calculate the likelihood of an event?

Threat and vulnerability


Related study sets

Exam 4 Evolve questions (partial)

View Set

4. Step 3 - Compile Study Materials

View Set