100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CDS348 Final Exam

Rating
-
Sold
-
Pages
7
Grade
A+
Uploaded on
31-03-2025
Written in
2024/2025

Exam of 7 pages for the course CDC at CDC (CDS348 Final Exam)

Institution
CDC
Course
CDC









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CDC
Course
CDC

Document information

Uploaded on
March 31, 2025
Number of pages
7
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

CDS348 Final Exam

One of the more commonly seen and most easily avoided incidents is the "blank" attack, where
employees are bombarded with numerous attempts to convince them to activate a link embedded in
an e-mail or respond to a request for communications with an unknown outside party, often
masquerading as a known entity - ANSWER-Phishing

a staffed control room where key security technologies, networks, and critical systems are monitored
for incidents is known as a(n) - ANSWER-security operations center

if an intruder can blank a device, then no electronic protection can deter the loss of information -
ANSWER-physical access

A(n) blank may signal an adverse event is under way and provide a notification of an incident
candidate - ANSWER-indicator

blank is the organized research and investigation of Internet addresses owned or controlled by a
target organization - ANSWER-footprinting

a series of steps that follow the stages of a cyberattack from early reconnaissance to the exfiltration
of data is known as the blank - ANSWER-cyber kill chain

A(n) blank may signal an incident that could occur in the future - ANSWER-precursor

the theft of organizational data, either physically or by extraction through the owners' networks is
called data blank - ANSWER-exfiltration

NIST SP 800-61, Rev. 1 provides a five category classification scheme for a network-based incidents
that includes each of these except - ANSWER-all of these are NIST incident classification

a set of software functionalities with capabilities that different clients can reuse for different purposes
is called a(n) blank - ANSWER-service

which of the following is not a "probable indicator" of an incident - ANSWER-presence or execution of
unknown programs or processes

the failure of a technical control to react to the intended stimulus so that it goes unreported is called
a blank - ANSWER-false negative

gathering information on and identifying network assets is known as fingerprinting - ANSWER-true

the most common detection of ransomware is via a message to a user that they have been locked out
of their computer system, and that their files and data have been encrypted - ANSWER-true

the most common detection of denial of service attack is a message to a user that they have been
locked out of their computer system, and that their files and data have been encrypted - ANSWER-
false

software designed to penetrate security controls, identify valuable content, and then encrypt files and
data in order to extort payment for the key needed to unlock the encryption is known as blackmail -
ANSWER-false

, an example of a possible indicator is if a business partner or another connected organization reports
an attack from your computing system - ANSWER-false

an indicator is an activity in progress that may signal an incident could occur in the future - ANSWER-
false

only those with advanced technical skills within a certain set of hardware and software can manually
detect signs of a(n) blank through reviews of logs, systems performance, user feedback, and system
processes and tasks - ANSWER-intrusion

the use of IDPS sensors and analysis systems can be quite complex. One very common approach is to
use an open source software program called blank running on a UNIX or Linux system that can be
managed and queried from a desktop computer using a client interface - ANSWER-snort

which is the most important factor when selecting a SIEM solution - ANSWER-the extent to which the
SIEM system provides the required features the organization needs

like the Wiretap Act's prohibition on intercepting the contents of communications, the blank creates a
general prohibition on the real time monitoring of traffic data relating to communications - ANSWER-
Pen/Trap statute

the SIEM capability of blank enables review of system activity that can identify breaches and reveal
insider misuse - ANSWER-user monitoring

blank are closely monitored network decoys that can distract adversaries from more valuable
machines on a network, provide early warning about new attack and exploitation trends; and can
allow in-depth examination fo adversaries during and after exploitation - ANSWER-honeypots

blank system use a combination of resources to detect an intrusion and then track it back to its source;
they must be used with caution to avoid illegal actions - ANSWER-trap and trace

the SIEM capability of blank enables flexible and timely reaction to attacks - ANSWER-real time
monitoring

a blank rootkit is one that becomes a part of the system bootstrap process and is loaded every time
the system boots - ANSWER-persistent

the process of classifying the attack alerts that an IDPS detects in order to distinguish or sort false
positives from actual attacks more efficiently is known as alarm blank - ANSWER-filtering

by guarding against some types of vulnerabilities, an IDPS can become an important part of an
organization's blank strategy - ANSWER-defense in depth

a unique value or pattern of an attack that enables detection is called a(n) - ANSWER-signature

the ongoing activity from alarm events that are accurate and noteworthy but not necessarily as
significant as potentially successful attacks is called blank - ANSWER-nosie

the problem with a signature based IDPS is that as new attack strategies are identified, the IDPS's
database of signatures must be continually updated - ANSWER-true

alarm condensation is a process based on frequency, similarity in attack signature, similarity in attack
target, or other similarties - ANSWER-false

tweaking is the process of adjusting an IDPS to maximize its efficiency in detecting true positives while
min false positives and false negatives - ANSWER-false

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
AndrewBenson Johns Hopkins University
View profile
Follow You need to be logged in order to follow users or courses
Sold
20
Member since
11 months
Number of followers
0
Documents
1951
Last sold
2 weeks ago

3.0

2 reviews

5
1
4
0
3
0
2
0
1
1

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions