ANSWERS WITH COMPLETE SOLUTIONS GRADED A++
LATEST UPDATE
The National Institute of Standards and Technology (NIST) provides a framework
that classifies security-related functions. Which description aligns with the
"respond" function?
Identify, analyze, and eradicate threats.
An engineer looks to implement security measures by following the five functions
in the National Institute of Standards and Technology (NIST) Cybersecurity
Framework. When documenting the "detect" function, what does the engineer
focus on?
Ongoing proactive monitoring
A company has an annual contract with an outside firm to perform a security
audit on their network. The purpose of the annual audit is to determine if the
company is in compliance with their internal directives and policies for security
control. Select the broad class of security control that accurately demonstrates
the purpose of the audit.
Managerial
How might the goals of a basic network management not be well-aligned with the
goals of security?
,Management focuses on availability over confidentiality.
After a poorly handled security breach, a company updates its security policy to
include an improved incident response plan. Which of the following security
controls does this update address?
Corrective
The IT department head returns from an industry conference feeling inspired by a
presentation on the topic of defense in depth. A meeting is scheduled with IT staff
to brainstorm ideas for implementing defense in depth throughout the
organization. Which of the following ideas are consistent with this industry best
practice? (Select all that apply.)
-Align managerial and technical controls with control functions.
-Provide user training on identifying cyber threats.
The _____ requires federal agencies to develop security policies for computer
systems that process confidential information.
Computer Security Act
Which of the following has a cyber security framework (CSF) that focuses
exclusively on IT security, rather than IT service provisioning?
National Institute of Standards and Technology (NIST)
Which security related phrase relates to the integrity of data?
Modification is authorized
Any external responsibility for an organization's security lies mainly with which
individuals?
,The owner
A security engineer investigates a recent system breach. When compiling a
report of the incident, how does the engineer classify the actor and the vector?
Threat
A contractor has been hired to conduct security reconnaissance on a company.
The contractor browses the company's website to identify employees and then
finds their Facebook pages. Posts found on Facebook indicate a favorite bar that
employees frequent. The contractor visits the bar and learns details of the
company's security infrastructure through small talk. What reconnaissance phase
techniques does the contractor practice? (Select all that apply.)
-Open Source Intelligence (OSINT)
-Social engineering
Which of the following could represent an insider threat? (Choose two)
-Contractor
-Former employee
A company technician goes on vacation. While the technician is away, a critical
patch released for Windows servers is not applied. According to the National
Institute of Standards and Technology (NIST), what does the delay in applying the
patch create on the server?
Vulnerability
What is Open Source Intelligence (OSINT)?
, Using web search tools and social media to obtain information about the target
One aspect of threat modeling is to identify potential threat actors and the risks
associated with each one. When assessing the risk that any one type of threat
actor poses to an organization, what are the critical factors to profile? (Select the
best two)
-Intent
-Motivation
A user with authorized access to systems in a software development firm installs
a seemingly harmless, yet unauthorized program on a workstation without the IT
department's sanction. Identify the type of threat that is a result of this user's
action.
Unintentional insider threat
An IT manager in the aviation sector checks the industry's threat intelligence feed
to keep up on the latest threats and ensure the work center implements the best
practices in the field. What type of threat intelligence source is the IT manager
most likely accessing?
An Information Sharing and Analysis Center (ISAC)
When exploring the deep web, a user will need which of the following to find a
specific and hidden dark web site?
A specific URL
A Department of Defense (DoD) security team identifies a data breach in
progress, based on some anomalous log entries, and take steps to remedy the