Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

Cyber 262 quiz 1 || with Errorless Answers.

Beoordeling
-
Verkocht
-
Pagina's
23
Cijfer
A+
Geüpload op
27-08-2025
Geschreven in
2025/2026

As Security professionals, the single most important asset that we must protect in an enterprise is ________ correct answers People As Security professionals, the second most important asset that we must protect in an enterprise is _________ correct answers Data What about computers, buildings, and infrastructure in securing data? correct answers We can buy new Servers, build new buildings but we can't get our data back unless we have strong protections in place. Attackers Evolve and are Sophisticated; Connectivity correct answers The internet has opened up access to provide convenience which is exploited. Attackers Evolve and are Sophisticated; Path of Least Resistance correct answers Enterprises have implemented sophisticated multi tiered defenses, so attackers take the easy way in ... tricking employees into clicking on links and giving up key information. Attackers Evolve and are Sophisticated; Sophistication and Organization correct answers Hackerville Attackers Evolve and are Sophisticated; Anonymity correct answers Crypto Currency like Bitcoin, Encryption and VPN's have aided hackers in remaining anonymous.

Meer zien Lees minder
Instelling
Cyber 262
Vak
Cyber 262

Voorbeeld van de inhoud

Cyber 262 quiz 1 || with Errorless Answers.


As Security professionals, the single most important asset that we must protect in an enterprise is
________ correct answers People


As Security professionals, the second most important asset that we must protect in an enterprise
is _________ correct answers Data


What about computers, buildings, and infrastructure in securing data? correct answers We can
buy new Servers, build new buildings but we can't get our data back unless we have strong
protections in place.


Attackers Evolve and are Sophisticated;
Connectivity correct answers The internet has opened up access to provide convenience which is
exploited.


Attackers Evolve and are Sophisticated;
Path of Least Resistance correct answers Enterprises have implemented sophisticated multi
tiered defenses, so attackers take the easy way in ... tricking employees into clicking on links and
giving up key information.


Attackers Evolve and are Sophisticated;
Sophistication and Organization correct answers Hackerville


Attackers Evolve and are Sophisticated;
Anonymity correct answers Crypto Currency like Bitcoin, Encryption and VPN's have aided
hackers in remaining anonymous.

,Attackers exploit weaknesses to gain access to Information. The most common attacks exploit
these 2 areas; correct answers People (Our Weakest Link) - Social Engineering attacks target the
good nature of employees to help in attacks. This can include Physical Security breaches.


Software - Runs our devices and needs to be protected.
- Servers: run operating system (OS) software
- Networks: run Network Operating Systems (NOS) software
- Desktops or Endpoints: run Operating Systems: Windows, MAC OSX, Linux
- Internet of Things (IoT) devices: run software and are one of our largest threats.
- Examples: Facility and Home Automation, Personal Assistants


Equifax Breach, September 2017 (confidentiality) correct answers Equifax announced that the
personal information of 147 Million people was compromised. Company agreed to a global
settlement of $671 million dollars to settle lawsuits and government investigations. (Equifax,
2019)
Root Cause:
Failure to Patch a two month old bug in Apache Struts Software


DynAttack, October 21 2016 (availability) correct answers Dyn was under a Distributed Denial
of Service (DDOS)
Caused Major Internet outages for several hours.
Attackers used a coordinated Botnet attack that leveraged thousands of IoT (cameras, thermostats
and baby monitors) infected with the Miraibotnet to launch the attack. (Graf, G. Wired, 2017)
Root Cause:
Failure to have proper alerts and DDOS detection systems in place.


Capital One, June, 29, 2019 (confidentiality) correct answers Confidential data of 100 million
people stolen from their cloud storage which appears to be an S3 AWS bucket.
Paige Thompson, former AWS employee was charged. (Bloomberg, 2019)
"Who's in your Wallet?"

, Root Cause:
Insider Access by former employee, failure to secure S3 cloud storage. Investigation ongoing.


Getting a Handle on Threats correct answers There are several sites and repositories for staying
up to date with Cybersecurity Threats, Vulnerabilities and Guidance.
We will focus on a www.us-cert.gov which is maintained by the Department of Homeland's
Cybersecurity and Infrastructure Agency (CISA).
CISA tracks Vulnerabilities and Offers Guidance across many agencies, Industries and Critical
Infrastructure sectors.


Getting a Handle on Threats
Information Security correct answers DATA protection is at the Heart of the CIA Triad
Confidentiality -Information is only accessed by authorized entities.
Integrity -Information is not modified or tampered with by entities that are not authorized to do
so.
Availability -Information and systems are available and accessible when users need them.


Threats and Vulnerabilities correct answers Threats are potential dangers.
In this picture the threat is water rising above the crack.
The Vulnerability is the Crack in the wall.


Threats and Vulnerabilities in IT Security correct answers Threats are potential dangers.
- Hackers
- Insiders
- Natural Disasters
Vulnerabilities are weaknesses in systems or procedures, they are ways threats become
manifested.
- Zero day exploits -New Bugs with no patch
- Weak passwords

Geschreven voor

Instelling
Cyber 262
Vak
Cyber 262

Documentinformatie

Geüpload op
27 augustus 2025
Aantal pagina's
23
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

€12,86
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
SirAnton NURSING, ECONOMICS, MATHEMATICS, BIOLOGY, AND HISTORY MATERIALS BEST TUTORING, HOMEWORK HELP, EXAMS, TESTS, AND STUDY GUIDE MATERIALS WITH GUARANTEED A+ I am a dedicated medical practitioner with diverse knowledge in matters
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
779
Lid sinds
3 jaar
Aantal volgers
438
Documenten
38563
Laatst verkocht
4 dagen geleden
Reign Supreme Scholarly || Enlightened.

Get your revised study materials available here and elevate your educational outcomes. I have numerous verified learning materials (Research, Exams Questions and answers, Assignments, notes etc) for different courses guaranteed to boost your academic results. I am dedicated to offering you the best and unique learning content. You are encouraged to inquire further assistance from this end whenever need be. Kindly remember to leave your review, understanding your satisfaction is essential . We highly appreciate clients who always come back for more of the study content we offer, you are extremely valued. All the best.

Lees meer Lees minder
3,7

116 beoordelingen

5
49
4
20
3
23
2
8
1
16

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen