complete solution
Any changes in behavior or deviation from baselines that result in an alert is an
activity that's part of:
Continuous monitoring
Because virtual machines run separately from the physical host operating
system, and they are commonly leveraged for sandbox testing, security
measures such as disabling unnecessary services, and applying updates, are not
applicable.
False
Which of the following is NOT a best practice for securing wireless
environments?
Broadcasting the access point SSID using proper network name only
Which of the following is an example of restricting access to files based on the
identity of the user or group?
Discretionary Access Control
Which of the following is a common environmental reconnaissance task that is
performed to help gain insight on how an organization's networked systems are
connected, or mapping the network?
Topology discovery
For most efficient logging activities and analysis, it is a best practice to only log
and monitor incoming firewall traffic.
False
Social engineering attacks attempt to convince a person to unwittingly take some
action which will help an attacker.
True
If you were setting up an IDS with the desire to detect exploits for unknown or
unreleased vulnerabilities which type of IDS would you use?
Anomaly detection
The 20 critical security controls developed by the Center for Internet Security,
also known as the SANS Top 20, are constructed using a combination of
information learned from:
Known attacks, effective defenses, industry experts
Which of the following vulnerability scan methods uses push technology and is
dependent on network connectivity?
Server-based
The federal version of certification and accreditation guidance that applies to
departments and agencies within the Department of Defense is:
DIACAP
Which of the following assessment types is performed with the penetration
testers having zero insight into the target organization's network topology, and
the organization's security team is unaware a penetration test is occurring?
Black box