Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CSX Cybersecurity Fundamentals: Practice Questions and Answers

Beoordeling
-
Verkocht
-
Pagina's
12
Cijfer
A+
Geüpload op
19-07-2022
Geschreven in
2021/2022

- Redundancy - Backups - access controls - ANSWER Three common controls used to protect the availability of information are Providing strategic direction, Ensuring that objectives are achieved, Verifying that organizational resources are being used appropriately, Ascertaining whether risk is being managed properly. - ANSWER Governance has several goals, including - Protect, - Recover - Identify - ANSWER According to the NIST framework, which of the following are considered key functions necessary for the protection of digital assets? Protecting information assets by addressing threats to information that is processed, stored or transported by interworked information systems - ANSWER The best definition for cybersecurity? Cybersecurity management - ANSWER Cybersecurity role that is charged with the duty of managing incidents and remediation? risk to an organization's digital assets. - ANSWER The core duty of cybersecurity is to identify, respond and manage is anything capable of acting against an asset in a manner that can cause harm. - ANSWER A threat is something of value worth protecting. - ANSWER A asset is a weakness in the design, implementation, operation or internal controls in a process that could be exploited to violate the system security - ANSWER A vulnerability attack vector - ANSWER The path or route used to gain access to the target asset is known as a payload - ANSWER In an attack, the container that delivers the exploit to the target is called communicate required and prohibited activities and behaviors. - ANSWER Policies is a class of malware that hides the existence of other malware by modifying the underlying operating system. - ANSWER Rootkit provide details on how to comply with policies and standards. - ANSWER Procedures contain step-by-step instructions to carry out procedures. - ANSWER Guidelines also called malicious code, is software designed to gain access to targeted computer systems, steal information or disrupt computer operations. - ANSWER Malware are used to interpret policies in specific situations. - ANSWER Standards are solutions to software programming and coding errors. - ANSWER Patches includes many components such as directory services, authentication and authorization services, and user management capabilities such as provisioning and deprovisioning. - ANSWER Identity Management Detect and block traffic from infected internal end points, Eliminate threats such as email spam, viruses and worms, Control user traffic bound toward the Internet, Monitor and detect network ports for rogue activity. - ANSWER The Internet perimeter should ensures that data are transferred reliably in the correct sequence - ANSWER Transport layer of the OSI coordinates and manages user connections - ANSWER Session layer of the OSI Encryption is an essential but incomplete form of access control - ANSWER best states the role of encryption within an overall cybersecurity program Asset value, criticality, reliability of each control and degree of exposure. - ANSWER The number and types of layers needed for defense in depth are a function of Least privilege or access control - ANSWER System hardening should implement the principle of Accounting management, Fault management, Performance management, Security management - ANSWER Which of the following are considered functional areas of network management as defined by ISO? Multiple guests coexisting on the same server in isolation of one another - ANSWER Virtualization involves Maintaining an asset inventory. - ANSWER Vulnerability management begins with an understanding of cybersecurity assets and their locations, which can be accomplished by Preparation, Detection and analysis, Investigation, Mitigation and recovery, Postincident analysis - ANSWER Arrange the steps of the incident response process into the correct order Containment - ANSWER Which element of an incident response plan involves obtaining and preserving evidence Who had access to the evidence, in chronological order, Proof that the analysis is based on copies identical to the original evidence, The procedures followed in working with the evidence - ANSWER Select three. The chain of custody contains information regarding "violation or imminent threat of violation of computer security policies, acceptable use policies, or standard security practices." - ANSWER NIST defines a Threat as a The estimated probability of the identified threats actually occurring, The efficiency and effectiveness of existing risk mitigation controls, A list of potential vulnerabilities, dangers and/or threats. - ANSWER Select all that apply. A business impact analysis (BIA) should identify is defined as "a model for enabling convenient, on-demand network access to a shared pool of configurable resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management or service provider interaction - ANSWER Cloud computing APTs typically originate from sources such as organized crime groups, activists or governments, APTs use obfuscation techniques that help them remain undiscovered for months or even years, APTs are often long-term, multi-phase projects with a focus on reconnaissance - ANSWER Select all that apply. Which of the following statements about advanced persistent threats (APTs) are true? The reorientation of technologies and services designed around the individual end user. - ANSWER Smart devices, BYOD strategies and freely available applications and services are all examples of: - cloud computing - social media - mobile computing - ANSWER Which three elements of the current threat landscape have provided increased levels of access and connectivity, and therefore increased opportunities for cybercrime Data Link - ANSWER To which of the following layers of the Open Systems Interconnect (OSI) model would one map Ethernet? Standards - ANSWER Which of the following interpret requirements and apply them to specific situations? Business needs - ANSWER Business continuity plans (BCPs) associated with organizational information systems should be developed primarily on the basis of: Consists of two or more security zones - ANSWER A segmented network Nonrepudiation - ANSWER Which cybersecurity principle is most important when attempting to trace the source of malicious activity? Wireless Protected Access 2 (WPA2) - ANSWER Which of the following offers the strongest protection for wireless network traffic? Core business functions - ANSWER Outsourcing poses the greatest risk to an organization when it involves: On a regular basis - ANSWER Risk assessments should be performed Chain of custody - ANSWER Maintaining a high degree of confidence regarding the integrity of evidence requires a(n): Stateful - ANSWER A firewall that tracks open connection-oriented protocol sessions is said to be: Planning - ANSWER During which phase of the system development lifecycle (SDLC) should security first be considered? System-centric - ANSWER A cybersecurity architecture designed around the concept of a perimeter is said to be: Physical - ANSWER A passive network hub operates at which layer of the OSI model? Homogeneous - ANSWER Updates in cloud-computing environments can be rolled out quickly because the environment is: Eradication - ANSWER During which phase of the six-phase incident response model is the root cause determined? Payload - ANSWER The attack mechanism directed against a system is commonly called a(n): At the perimeter, to allow for effective internal monitoring - ANSWER Where should an organization's network terminate virtual private network (VPN) tunnels? Asymmetric key encryption is used to securely obtain symmetric keys - ANSWER In practical applications: Threat and vulnerability - ANSWER Which two factors are used to calculate the likelihood of an event? Flexibility - ANSWER What is one advantage of a firewall implemented in software over a firewall appliance? Detailed procedures - ANSWER A business continuity plan (BCP) is not complete unless it includes: Malicious code - ANSWER Under the US-CERT model for incident categorization, a CAT-3 incident refers to which of the following? Emergent - ANSWER An interoperability error is what type of vulnerability? Operate in specialized environments and often have non-standard design elements - ANSWER Securing Supervisory Control and Data Acquisition (SCADA) systems can be challenging because they Insecure protocols could result in a compromise of privileged user credentials - ANSWER Virtual systems should be managed using a dedicated virtual local area network (VLAN) because Security continuous monitoring, detection and evaluating anomalies/incidents - ANSWER Describes the activities required to identify the occurrence of a cybersecurity incident Governance - ANSWER This key function ensures that organizational objectives and stakeholder needs are aligned with desired outcomes through effective decision making and prioritization. Protecting a company's digital assets - ANSWER The primary objective of cybersecurity is Recovery - ANSWER The activity that ensures business processes continue after a security incident Asset management - ANSWER Which is associated with identifying digital assets Adherence to required laws and regulations, Implementation of required procedures, Development of internal controls to mitigate risk, Adherence to voluntary contractual requirements. - ANSWER Responsibilities and/or duties of Governance, Risk Management and Compliance (GRC) Board of Directors - ANSWER In most information security organizations, which role sets the overall strategic direction Implement contractual obligations - ANSWER Governance involves all of the following except Provide strategic direction, Ensure responsible use of company resources, Evaluate whether risk is managed appropriately - ANSWER Governance involves all of the following Cybersecurity practitioners - ANSWER Which role is generally responsible for the design, implementation, management processes and technical controls within a security organization Cyber risk, investment risk and financial risk - ANSWER Which of the following falls within the scope of risk management Information security - ANSWER Which term describes the overall structure designed to protect an organization from disclosure of information to unauthorized users, improper modification of data, and non-access to systems Cybersecurity includes protection of paper documents - ANSWER The following statement is false: Cybersecurity is a component of information security, Cybersecurity deals with the protection of digital assets, Cybersecurity should align with enterprise information security objectives - ANSWER All of the following statements are true: Recognizing risk, Assessing impact and likelihood of risk, Developing strategies to mitigate risk - ANSWER Risk management involves which of the following activities Ensuring information security objectives are achieved - ANSWER Risk management does not involve Information that is processed, stored or transported within internetworked information systems - ANSWER Cybersecurity involves the protection of the following digital assets Ongoing, Evolving, Systemic - ANSWER Which terms describe the overall concept of information security? Fraud - ANSWER Potential consequences of lack of confidentiality except Disclosure of information protected by privacy laws, Legal action against the enterprise, Interference with national security - ANSWER Potential consequences of lack of confidentiality File permission - ANSWER The degree to which a user or program can create, modify, read, or write to a file is called Confidentiality - ANSWER Which information security component considers the level of sensitivity and legal requirements and is subject to change over time The act of verifying identity, The act of verifying a user's eligibility to access computerized information - ANSWER Authentication is defined as Identity management - ANSWER Establishment and maintenance of user profiles that define the authentication, authorization and access controls for each user is called Hashes - ANSWER A cryptology tool used to prove message integrity using algorithms to create unique numeric values Inaccuracy, Erroneous decisions, Fraud - ANSWER Potential consequences of lack of integrity Protection of information from unauthorized modification - ANSWER Integrity is described as - Logging - Digital Signatures - Hashes - Encryption - ANSWER Methods of control that can help protect integrity Log - ANSWER Which type of documentation records details of information or events in an organized record-keeping system, usually sequenced in the order in which they occurred Lack of availability - ANSWER A week of severe rainstorms has flooded your company's building. All servers have been ruined. It is estimated that business will be down for 3 weeks. This is an example of Redundancy - ANSWER When two or more controls work in parallel to protect an asset, it is called - full - incremental - differential - ANSWER Types of backups Only copies files that have changed since last full backup - ANSWER A differential backup Loss of functionality and operational effectiveness, Loss of productive time, Interference with enterprise's objectives - ANSWER Potential consequences resulting from lack of availability include Nonrepudiation - ANSWER The concept that a message or other piece of information is genuine is called The act of verifying identity, Verification of the correctness of a piece of data, Designed to protect against fraudulent logon activity, Verifying a user's eligibility to access computerized information - ANSWER Describe authentication - Transactional logs - Digital signatures - ANSWER Nonrepudiation is implemented through which methods Encryption - ANSWER The process of converting plaintext messages, applying a mathematical function to them and producing ciphertext messages is called: Access controls - ANSWER What control mechanism defines authentication and authorization protocols for users? - redundancy - backups - access controls - ANSWER Three common controls used to protect the availability of information are: -providing strategic direction - ensuring that objectives are achieved - verifying that organizational resources are being used appropriately - ascertaining whether risk is being managed . properly - ANSWER Governance has several goals, including: - Identify - Protect - Detect - Respond - Recover - ANSWER According to the NIST cybersecurity framework, what are considered key functions necessary for the protection of digital assets? Protecting information assets by addressing threats to information that is pr

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

CSX Cybersecurity Fundamentals:
Practice Questions
- Redundancy
- Backups
- access controls - ANSWER Three common controls used to protect the availability of
information are

Providing strategic direction, Ensuring that objectives are achieved, Verifying that
organizational resources are being used appropriately, Ascertaining whether risk is
being managed properly. - ANSWER Governance has several goals, including

- Protect,
- Recover
- Identify - ANSWER According to the NIST framework, which of the following are
considered key functions necessary for the protection of digital assets?

Protecting information assets by addressing threats to information that is processed,
stored or transported by interworked information systems - ANSWER The best definition
for cybersecurity?

Cybersecurity management - ANSWER Cybersecurity role that is charged with the duty
of managing incidents and remediation?

risk to an organization's digital assets. - ANSWER The core duty of cybersecurity is to
identify, respond and manage

is anything capable of acting against an asset in a manner that can cause harm. -
ANSWER A threat

is something of value worth protecting. - ANSWER A asset

is a weakness in the design, implementation, operation or internal controls in a process
that could be exploited to violate the system security - ANSWER A vulnerability

attack vector - ANSWER The path or route used to gain access to the target asset is
known as a

payload - ANSWER In an attack, the container that delivers the exploit to the target is
called

communicate required and prohibited activities and behaviors. - ANSWER Policies

is a class of malware that hides the existence of other malware by modifying the
underlying operating system. - ANSWER Rootkit

provide details on how to comply with policies and standards. - ANSWER Procedures

, CSX Cybersecurity Fundamentals:
Practice Questions
contain step-by-step instructions to carry out procedures. - ANSWER Guidelines

also called malicious code, is software designed to gain access to targeted computer
systems, steal information or disrupt computer operations. - ANSWER Malware

are used to interpret policies in specific situations. - ANSWER Standards

are solutions to software programming and coding errors. - ANSWER Patches

includes many components such as directory services, authentication and authorization
services, and user management capabilities such as provisioning and deprovisioning. -
ANSWER Identity Management

Detect and block traffic from infected internal end points, Eliminate threats such as
email spam, viruses and worms, Control user traffic bound toward the Internet, Monitor
and detect network ports for rogue activity. - ANSWER The Internet perimeter should

ensures that data are transferred reliably in the correct sequence - ANSWER Transport
layer of the OSI

coordinates and manages user connections - ANSWER Session layer of the OSI

Encryption is an essential but incomplete form of access control - ANSWER best states
the role of encryption within an overall cybersecurity program

Asset value, criticality, reliability of each control and degree of exposure. - ANSWER
The number and types of layers needed for defense in depth are a function of

Least privilege or access control - ANSWER System hardening should implement the
principle of

Accounting management, Fault management, Performance management, Security
management - ANSWER Which of the following are considered functional areas of
network management as defined by ISO?

Multiple guests coexisting on the same server in isolation of one another - ANSWER
Virtualization involves

Maintaining an asset inventory. - ANSWER Vulnerability management begins with an
understanding of cybersecurity assets and their locations, which can be accomplished
by

Geschreven voor

Vak

Documentinformatie

Geüpload op
19 juli 2022
Aantal pagina's
12
Geschreven in
2021/2022
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$9.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
millyphilip West Virginia University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
2927
Lid sinds
4 jaar
Aantal volgers
1958
Documenten
44533
Laatst verkocht
7 uur geleden
white orchid store

EXCELLENCY IN ACCADEMIC MATERIALS ie exams, study guides, testbanks ,case, case study etc

3.6

552 beoordelingen

5
240
4
87
3
104
2
32
1
89

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen