Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

CDS Final UPDATED Questions and CORRECT Answers

Rating
-
Sold
-
Pages
13
Grade
A+
Uploaded on
02-05-2026
Written in
2025/2026

CDS Final UPDATED Questions and CORRECT Answers

Institution
Science
Course
Science

Content preview

CDS Final UPDATED Questions and
CORRECT Answers
A series of steps that follow the stages of a cyberattack from early reconnaissance to the exfiltration of
data is known as the ____. - CORRECT ANSWER - cyber kill chain



________ is used to maintain awareness of evolving threats in general and is a resource for researching
specific threats as an organization develops usable threat intelligence - CORRECT ANSWER -
open source intelligence



if an intruder can _____ a device, then no electronic protection can deter the loss of information -
CORRECT ANSWER - physically access



which of the following is not a definite indicator of an incident - CORRECT ANSWER - presence
of unfamiliar files



the failure of a technical control to react to the intended stimulus so that it goes unreported is called
a___________ - CORRECT ANSWER - false negative



one of the more commonly seen and most easily avoided incidents is the _______ attack, where
employees are bombarded with numerous attempts to convince them to activate a link embedded in an
email or respond to a request for communications with an unknown outside party, often masquerading as
a known entity - CORRECT ANSWER - phishing



the use of email in fraudulent efforts to compromise the organization is known as ______ - CORRECT
ANSWER - business email compromise



a decoy application or systems simulation that attempt to draw attackers to it and away from actual
production systems is known as a ________ - CORRECT ANSWER - honeypot



_______ is the organized research and investigation of internet addresses owned or controlled by a target
organization - CORRECT ANSWER - footprinting

, the theft of organizational data, either physically or by extraction through the owners networks is called
data _________ - CORRECT ANSWER - exfiltration



in the event that a definite indicator is recognized, the corresponding ______ must be activated
immediately - CORRECT ANSWER - IR plan



a staffed control room where key security technologies, networks, and critical systems are monitored for
incidents is known as _____________ - CORRECT ANSWER - security operations center



Passive Scanning is the process of collecting information about computers by sending traffic and
observing what traffic returns as a result.

t or f - CORRECT ANSWER - False



The Windows Task Manager can be used to review all processes on microsoft windows computers.

t or f - CORRECT ANSWER - false



an incident candidate is an adverse event that is a possible incident.

t or f - CORRECT ANSWER - true



malware includes viruses, worms, trojan horses, and an entire library of malicious scripts designed to steal
information, deny service to needed resources, and generally wreak havoc in the organization.

t or f - CORRECT ANSWER - true



the msot common detection of a denial-of-service attack is a message to a user that they have been locked
out of their computer system, and that their files and data have been encrypted.

t or f - CORRECT ANSWER - false



software designed to penetrate security controls, identitfy valuable content, and then encrypt files and data
in order to extort payment for the key needed to unlock the encryption is known as blackmail.

Written for

Institution
Science
Course
Science

Document information

Uploaded on
May 2, 2026
Number of pages
13
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

12.99 $
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
MGRADES Stanford University
Follow You need to be logged in order to follow users or courses
Sold
1365
Member since
2 year
Number of followers
103
Documents
83021
Last sold
23 hours ago
MGRADES (Genius Brains)

Welcome to MGRADES Exams, practices and Study materials The work speaks for itself Me and my team will always make sure you get the best value from the exams markets. I offer the best study and exam materials for a wide range of courses and units. Make your study sessions more efficient and effective. Dive in and discover all you need to excel in your academic journey!

3.8

227 reviews

5
93
4
49
3
51
2
14
1
20

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions