which of these is the best definition of a security risk - *answers * the likelihood of a threat
source exploiting a vulnerability
Fancy Bears and Anonymous are examples of what - *answers * Hacking organizations
which of the following defines a security threat - *answers * Any potential danger capable of
exploiting a weaknesses in a system
implement a filter to remove flooded packets before they reach the host is a countermeasure to
which form of attack - *answers * a denial of service (DoS) attack
An email message that is encrypted, uses a digital signature and carries a hash value would
address which aspects of CIA Triad - *answers * Confidentiality and integrity
A company wants to prevent employees from wasting time on social media sites. to accomplish
this, a document forbidding use of these sites while at work is written and circulated and then
the firewalls are updated to block access to Facebook, Twitter and other popular sites. which 2
types of security controls has the company just implemented - *answers * Technical
Administrative
A penetration tester that gains access to a system without permission and then exploits it for a
personal gain is said to wear what color hat - *answers * black
Trying to break an encryption key by trying every possible combination of characters is called
what - *answers * A brute force attack
Which 3 of the following are key ITIL processes - *answers * Problem Management
Incident Management
Change Management
, ibm cybersecurity
Which 3 roles are typically found in an information Security organization - *answers *
Penetration Tester
Chief information Security Officer (CISO)
Vulnerability Assessor
ITIL is best described as what - *answers * A collection of IT Service Management best practices
Alice sends a message to Bob that is intercepted by Trudy. Which scenario describes an integrity
violation - *answers * Trudy changes the message and then forwards it on
In cybersecurity, Authenticity is defined as what - *answers * The property of being genuine
and verifiable
Which type of access control is based upon the subjects clearance level and the objects
classification - *answers * Mandatory Access Control (MAC)
The encryption and protocols used to prevent unauthorized access to data are examples of
which type of access control - *answers * Technical
A windows 10 user has 10 files exactly the same name. Which statement must be true for these
files - *answers * The Files must be in different directories
Which component of the Linux operating system interacts with your computers hardware -
*answers * The kernel
If cost is the primary concern, which type of cloud should be considered first - *answers *
Public cloud