DCOM 258 - SECURITY + QUESTIONS & ANSWERS
A system analyst is tasked with searching the dark web for harvested customer data.
Because these sites cannot be readily found in standard website searches, what is
often gained by "word of mouth" bulletin boards to assist in reaching the desired page? -
Answers - Dark Website URL - Access to deep websites are accessed via URL.
One aspect of threat modeling is to identify potential threat actors and the risks
associated with each one. When assessing the risk that any one type of threat actor
poses to an organization, what are the most critical factors to profile? (Select all that
apply.) - Answers - Intent, motivation
Which of the following are the best examples of an insider threat? (Select all that apply.)
- Answers - Former employee, contractor
A contractor has been hired to conduct security reconnaissance on a company. The
contractor browses the company's website to identify employees and then finds their
Facebook pages. Posts found on Facebook indicate a favorite bar that employees
frequently visit. The contractor visits the bar and learns details of the company's security
infrastructure through small talk. What reconnaissance phase techniques does the
contractor practice? (Select all that apply.) - Answers - OSINT, Social engineering
A Department of Defense (DoD) security team identifies a data breach in progress,
based on some anomalous log entries, and take steps to remedy the breach and
harden their systems. When they resolve the breach, they want to publish the cyber
threat intelligence (CTI) securely, using standardized language for other government
agencies to use. The team will transmit threat data feed via which protocol? - Answers
- Structured Threat Information eXpression (STIX)
Which situation would require keyboard encryption software to be installed on a
computer? - Answers - To protect against spyware
Analyze the following attacks to determine which best illustrates a pharming attack. -
Answers - A customer enters the correct URL address of their bank, which should point
to the IP address 172.1.24.4. However, the browser goes to 168.254.1.1, which is a
fake site designed to look exactly like the real bank site.
An employee calls IT personnel and states that they received an email with a PDF
document to review. After the PDF was opened, the system has not been performing
correctly. An IT admin conducted a scan and found a virus. Determine the two types of
viruses the computer most likely has. (Select all that apply.) - Answers - Macro, script
Which of the following utilizes both symmetric and asymmetric encryption? - Answers -
Digital Envelope - A type of key exchange system that utilizes symmetric encryption for
speed and asymmetric encryption for security.
A system analyst is tasked with searching the dark web for harvested customer data.
Because these sites cannot be readily found in standard website searches, what is
often gained by "word of mouth" bulletin boards to assist in reaching the desired page? -
Answers - Dark Website URL - Access to deep websites are accessed via URL.
One aspect of threat modeling is to identify potential threat actors and the risks
associated with each one. When assessing the risk that any one type of threat actor
poses to an organization, what are the most critical factors to profile? (Select all that
apply.) - Answers - Intent, motivation
Which of the following are the best examples of an insider threat? (Select all that apply.)
- Answers - Former employee, contractor
A contractor has been hired to conduct security reconnaissance on a company. The
contractor browses the company's website to identify employees and then finds their
Facebook pages. Posts found on Facebook indicate a favorite bar that employees
frequently visit. The contractor visits the bar and learns details of the company's security
infrastructure through small talk. What reconnaissance phase techniques does the
contractor practice? (Select all that apply.) - Answers - OSINT, Social engineering
A Department of Defense (DoD) security team identifies a data breach in progress,
based on some anomalous log entries, and take steps to remedy the breach and
harden their systems. When they resolve the breach, they want to publish the cyber
threat intelligence (CTI) securely, using standardized language for other government
agencies to use. The team will transmit threat data feed via which protocol? - Answers
- Structured Threat Information eXpression (STIX)
Which situation would require keyboard encryption software to be installed on a
computer? - Answers - To protect against spyware
Analyze the following attacks to determine which best illustrates a pharming attack. -
Answers - A customer enters the correct URL address of their bank, which should point
to the IP address 172.1.24.4. However, the browser goes to 168.254.1.1, which is a
fake site designed to look exactly like the real bank site.
An employee calls IT personnel and states that they received an email with a PDF
document to review. After the PDF was opened, the system has not been performing
correctly. An IT admin conducted a scan and found a virus. Determine the two types of
viruses the computer most likely has. (Select all that apply.) - Answers - Macro, script
Which of the following utilizes both symmetric and asymmetric encryption? - Answers -
Digital Envelope - A type of key exchange system that utilizes symmetric encryption for
speed and asymmetric encryption for security.