FedVTE Cyber Risk Management for Technicians questions and answers 100% verified.
FedVTE Cyber Risk Management for Technicians questions and answers 100% verified. The threat source is highly motivated and sufficiently capable and controls to prevent the vulnerability from being exercised are ineffective. Which likelihood rating does this describe? A. High B. Medium C. Low D. None of the above - correct answers.A. High Kismet is different from a normal network sniffer such as Wireshark or tcpdump because it separates and identifies different wireless networks in the area. A. True B. False - correct answers.A. True Which step of a risk assessment uses the history of system attacks? A. Step 2: Threat Identification B. Step 3: Vulnerability Identification C. Step 4: Control Analysis D. Step 5: Likelihood Determination - correct answers.A. Step 2: Threat Identification Open Source Security (OSSEC) is what? A. A host based security system that monitors for changes B. A network based security system that sends alert messages C. An email based security system that scans emails for vulnerabilities. D. None of the above - correct answers.A. A host based security system that monitors for changes Which of the following families of controls belongs to the technical class of controls? A. Physical and Environmental Protection B. System and Information Integrity C. System and Services Acquisition D. Identification and Authentication - correct answers.D. Identification and Authentication
Escuela, estudio y materia
- Institución
- FedVTE Cyber Risk Management for Technicians
- Grado
- FedVTE Cyber Risk Management for Technicians
Información del documento
- Subido en
- 23 de septiembre de 2023
- Número de páginas
- 8
- Escrito en
- 2023/2024
- Tipo
- Examen
- Contiene
- Preguntas y respuestas
Temas
-
fedvte cyber risk management for technicians
Documento también disponible en un lote