Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

ISACA CybserSecurity Fundamentals Review 2022 with complete solution

Beoordeling
-
Verkocht
-
Pagina's
15
Cijfer
A+
Geüpload op
01-07-2022
Geschreven in
2021/2022

accountability ability to map a given activity or event back to the responsible party advanced encryption standard (AES) algorithm that supports keys from 128 bits to 256 bits 00:03 01:17 advanced persistent threat 1. pursues its objectives repeatedly over an extended period of time 2. adapts to defenders efforts to resist it 3. is determined to maintain the level of interaction needed to execute its objectives adware software package that automatically display advertising material to a computer application layer layer provides services for an application program to ensure that effective communication with another application program in a network is possible attack vector path or route used by the adversary to gain access to the target. There are two types of attack vectors: 1. ingress 2. egress attenuation reduction of signal strength during transmission availability ensuring timely and reliable access to and use of information back door means of regaining access of a comprised system by installing software or configuring existing software to enable remote access under attack-defined conditions bastion system heavily fortified against attacks botnet robot network: large automated distributed network of compromised computers that are controlled to launch large-scale attacks Bridges Data link layer devices that reduce collision domains

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

ISACA CybserSecurity Fundamentals
accountability - ANSWER ability to map a given activity or event back to the responsible
party

advanced encryption standard (AES) - ANSWER algorithm that supports keys from 128
bits to 256 bits

advanced persistent threat - ANSWER 1. pursues its objectives repeatedly over an
extended period of time
2. adapts to defenders efforts to resist it
3. is determined to maintain the level of interaction needed to execute its objectives

adware - ANSWER software package that automatically display advertising material to
a computer

application layer - ANSWER layer provides services for an application program to
ensure that effective communication with another application program in a network is
possible

attack vector - ANSWER path or route used by the adversary to gain access to the
target. There are two types of attack vectors:
1. ingress
2. egress

attenuation - ANSWER reduction of signal strength during transmission

availability - ANSWER ensuring timely and reliable access to and use of information

back door - ANSWER means of regaining access of a comprised system by installing
software or configuring existing software to enable remote access under attack-defined
conditions

bastion - ANSWER system heavily fortified against attacks

botnet - ANSWER robot network: large automated distributed network of compromised
computers that are controlled to launch large-scale attacks

Bridges - ANSWER Data link layer devices that reduce collision domains

buffer overflow - ANSWER occurs when a program/process tries to store more data in a
buffer than it was intended to hold.

business continuity plan - ANSWER plan used by enterprise to respond to disruption of
critical business processes

business impact analysis - ANSWER Evaluates the criticality and sensitivity of
information assets

, ISACA CybserSecurity Fundamentals
Certificate (Certification) authority (CA) - ANSWER trusted third party that serves
authentication infrastructures or enterprises and registers entities and issues them
certificates

chain of custody - ANSWER legal principle regarding the validity and integrity of
evidence
INCLUDES:
-who had access to evidence
-ability to identify evidence is the exact item that has been recovered or tested

checksum - ANSWER mathematical value assigned to a file that's used to verify that
data contained in the file has not been maliciously changed

cloud computing - ANSWER model for enabling convenient, on-demand network access
to a shared pool of configurable resources that can be rapidly provisioned and released
with minimal management or service provider interaction

collision - ANSWER situation that occurs when two or more demands are made
simultaneously on equipment that can handle only one at any given instant

compliance document - ANSWER policies, standards and procedures

confidentiality - ANSWER preserving authorized restrictions on access and disclosure,
including means for protecting privacy and proprietary information

configuration management - ANSWER control of changes to a set of configuration items
over a system life cycle

consumerization - ANSWER new model in which emerging technologies are first
embraced by the consumer market and later spread to the business

content filtering - ANSWER controlling access to a network by analyzing the contents of
incoming and outgoing packets and letting them pass or denying them based on a list of
rules

control - ANSWER means of managing risk. This includes:
1. policies
2. procedures
3. guidelines
4. practices/organizational structures

criticality analysis - ANSWER analysis to evaluate resources or business functions to
identify their importance to the enterprise

Geschreven voor

Vak

Documentinformatie

Geüpload op
1 juli 2022
Aantal pagina's
15
Geschreven in
2021/2022
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$10.89
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
millyphilip West Virginia University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
2923
Lid sinds
4 jaar
Aantal volgers
1958
Documenten
44307
Laatst verkocht
3 uur geleden
white orchid store

EXCELLENCY IN ACCADEMIC MATERIALS ie exams, study guides, testbanks ,case, case study etc

3.6

551 beoordelingen

5
239
4
87
3
104
2
32
1
89

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen