Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

DCOM258 MIDTERM STUDY EXAM QUESTIONS AND ANSWERS WITH COMPLETE SOLUTIONS GRADED A++ LATEST UPDATE

Beoordeling
-
Verkocht
-
Pagina's
65
Cijfer
A+
Geüpload op
01-02-2025
Geschreven in
2024/2025

DCOM258 MIDTERM STUDY EXAM QUESTIONS AND ANSWERS WITH COMPLETE SOLUTIONS GRADED A++ LATEST UPDATE The National Institute of Standards and Technology (NIST) provides a framework that classifies security-related functions. Which description aligns with the "respond" function? Identify, analyze, and eradicate threats. An engineer looks to implement security measures by following the five functions in the National Institute of Standards and Technology (NIST) Cybersecurity Framework. When documenting the "detect" function, what does the engineer focus on? Ongoing proactive monitoring A company has an annual contract with an outside firm to perform a security audit on their network. The purpose of the annual audit is to determine if the company is in compliance with their internal directives and policies for security control. Select the broad class of security control that accurately demonstrates the purpose of the audit. Managerial How might the goals of a basic network management not be well-aligned with the goals of security? Management focuses on availability over confidentiality. After a poorly handled security breach, a company updates its security policy to include an improved incident response plan. Which of the following security controls does this update address? Corrective The IT department head returns from an industry conference feeling inspired by a presentation on the topic of defense in depth. A meeting is scheduled with IT staff to brainstorm ideas for implementing defense in depth throughout the organization. Which of the following ideas are consistent with this industry best practice? (Select all that apply.) -Align managerial and technical controls with control functions. -Provide user training on identifying cyber threats. The _____ requires federal agencies to develop security policies for computer systems that process confidential information. Computer Security Act Which of the following has a cyber security framework (CSF) that focuses exclusively on IT security, rather than IT service provisioning? National Institute of Standards and Technology (NIST) Which security related phrase relates to the integrity of data? Modification is authorized Any external responsibility for an organization's security lies mainly with which individuals? The owner A security engineer investigates a recent system breach. When compiling a report of the incident, how does the engineer classify the actor and the vector? Threat A contractor has been hired to conduct security reconnaissance on a company. The contractor browses the company's website to identify employees and then finds their Facebook pages. Posts found on Facebook indicate a favorite bar that employees frequent. The contractor visits the bar and learns details of the company's security infrastructure through small talk. What reconnaissance phase techniques does the contractor practice? (Select all that apply.) -Open Source Intelligence (OSINT) -Social engineering Which of the following could represent an insider threat? (Choose two) -Contractor -Former employee A company technician goes on vacation. While the technician is away, a critical patch released for Windows servers is not applied. According to the National Institute of Standards and Technology (NIST), what does the delay in applying the patch create on the server? Vulnerability What is Open Source Intelligence (OSINT)?

Meer zien Lees minder
Instelling
Vak

Voorbeeld van de inhoud

DCOM258 MIDTERM STUDY EXAM QUESTIONS AND

ANSWERS WITH COMPLETE SOLUTIONS GRADED A++

LATEST UPDATE


The National Institute of Standards and Technology (NIST) provides a framework

that classifies security-related functions. Which description aligns with the

"respond" function?

Identify, analyze, and eradicate threats.

An engineer looks to implement security measures by following the five functions

in the National Institute of Standards and Technology (NIST) Cybersecurity

Framework. When documenting the "detect" function, what does the engineer

focus on?

Ongoing proactive monitoring

A company has an annual contract with an outside firm to perform a security

audit on their network. The purpose of the annual audit is to determine if the

company is in compliance with their internal directives and policies for security

control. Select the broad class of security control that accurately demonstrates

the purpose of the audit.

Managerial

How might the goals of a basic network management not be well-aligned with the

goals of security?

,Management focuses on availability over confidentiality.

After a poorly handled security breach, a company updates its security policy to

include an improved incident response plan. Which of the following security

controls does this update address?

Corrective

The IT department head returns from an industry conference feeling inspired by a

presentation on the topic of defense in depth. A meeting is scheduled with IT staff

to brainstorm ideas for implementing defense in depth throughout the

organization. Which of the following ideas are consistent with this industry best

practice? (Select all that apply.)

-Align managerial and technical controls with control functions.



-Provide user training on identifying cyber threats.

The _____ requires federal agencies to develop security policies for computer

systems that process confidential information.

Computer Security Act

Which of the following has a cyber security framework (CSF) that focuses

exclusively on IT security, rather than IT service provisioning?

National Institute of Standards and Technology (NIST)

Which security related phrase relates to the integrity of data?

Modification is authorized

Any external responsibility for an organization's security lies mainly with which

individuals?

,The owner

A security engineer investigates a recent system breach. When compiling a

report of the incident, how does the engineer classify the actor and the vector?

Threat

A contractor has been hired to conduct security reconnaissance on a company.

The contractor browses the company's website to identify employees and then

finds their Facebook pages. Posts found on Facebook indicate a favorite bar that

employees frequent. The contractor visits the bar and learns details of the

company's security infrastructure through small talk. What reconnaissance phase

techniques does the contractor practice? (Select all that apply.)

-Open Source Intelligence (OSINT)



-Social engineering

Which of the following could represent an insider threat? (Choose two)

-Contractor



-Former employee

A company technician goes on vacation. While the technician is away, a critical

patch released for Windows servers is not applied. According to the National

Institute of Standards and Technology (NIST), what does the delay in applying the

patch create on the server?

Vulnerability

What is Open Source Intelligence (OSINT)?

, Using web search tools and social media to obtain information about the target

One aspect of threat modeling is to identify potential threat actors and the risks

associated with each one. When assessing the risk that any one type of threat

actor poses to an organization, what are the critical factors to profile? (Select the

best two)

-Intent



-Motivation

A user with authorized access to systems in a software development firm installs

a seemingly harmless, yet unauthorized program on a workstation without the IT

department's sanction. Identify the type of threat that is a result of this user's

action.

Unintentional insider threat

An IT manager in the aviation sector checks the industry's threat intelligence feed

to keep up on the latest threats and ensure the work center implements the best

practices in the field. What type of threat intelligence source is the IT manager

most likely accessing?

An Information Sharing and Analysis Center (ISAC)

When exploring the deep web, a user will need which of the following to find a

specific and hidden dark web site?

A specific URL

A Department of Defense (DoD) security team identifies a data breach in

progress, based on some anomalous log entries, and take steps to remedy the

Geschreven voor

Vak

Documentinformatie

Geüpload op
1 februari 2025
Aantal pagina's
65
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$11.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
NurseAdvocate chamberlain College of Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
494
Lid sinds
2 jaar
Aantal volgers
77
Documenten
12046
Laatst verkocht
15 uur geleden
NURSE ADVOCATE

I have solutions for following subjects: Nursing, Business, Accounting, statistics, chemistry, Biology and all other subjects. Nursing Being my main profession line, I have essential guides that are Almost A+ graded, I am a very friendly person: If you would not agreed with my solutions I am ready for refund

4.6

239 beoordelingen

5
193
4
14
3
15
2
6
1
11

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen