FedVTE Cyber Risk Management for Technicians questions and answers 100% verified.
FedVTE Cyber Risk Management for Technicians questions and answers 100% verified. The threat source is highly motivated and sufficiently capable and controls to prevent the vulnerability from being exercised are ineffective. Which likelihood rating does this describe? A. High B. Medium C. Low D. None of the above - correct answers.A. High Kismet is different from a normal network sniffer such as Wireshark or tcpdump because it separates and identifies different wireless networks in the area. A. True B. False - correct answers.A. True Which step of a risk assessment uses the history of system attacks? A. Step 2: Threat Identification B. Step 3: Vulnerability Identification C. Step 4: Control Analysis D. Step 5: Likelihood Determination - correct answers.A. Step 2: Threat Identification Open Source Security (OSSEC) is what? A. A host based security system that monitors for changes B. A network based security system that sends alert messages C. An email based security system that scans emails for vulnerabilities. D. None of the above - correct answers.A. A host based security system that monitors for changes Which of the following families of controls belongs to the technical class of controls? A. Physical and Environmental Protection B. System and Information Integrity C. System and Services Acquisition D. Identification and Authentication - correct answers.D. Identification and Authentication
Written for
- Institution
- FedVTE Cyber Risk Management for Technicians
- Course
- FedVTE Cyber Risk Management for Technicians
Document information
- Uploaded on
- September 23, 2023
- Number of pages
- 8
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
fedvte cyber risk management for technicians
Also available in package deal