100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

LATEST CYBERSECURITY II MANAGEMENT UPDATED EXAMS WITH Q&A 100% ACCURATE ANSWERS {CLEANEST VERSION}

Rating
-
Sold
-
Pages
16
Grade
A+
Uploaded on
10-04-2025
Written in
2024/2025

LATEST CYBERSECURITY II MANAGEMENT UPDATED EXAMS WITH Q&A 100% ACCURATE ANSWERS {CLEANEST VERSION} What is a vulnerability? - CORRECT ANSWER-a weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source. What is a penetration test? - CORRECT ANSWER-a simulated cyber attack against your systems or company What are the typical steps for a vulnerability test? - CORRECT ANSWER-Identify asset classification list, identify vulnerabilities, test assets against vulnerabilities, and recommend solutions to either eliminate or mitigate vulnerabilities What is the first thing an organization should do before defining security requirements? - CORRECT ANSWER-To define security requirements, first an organization must define its risk appetite. What is defense in depth? - CORRECT ANSWER-defense-in-depth principle; it is by adding relevant layer of controls (e.g., access control, encryption, and monitoring) that the expected level of protection is achieved. What are COTS applications? - CORRECT ANSWER-Applications developed by vendors and installed on the organization's information systems. These applications are usually purchased outright by organizations with usage based on licensing agreements. What are SaaS applications? - CORRECT ANSWER-Applications developed by service providers or vendors and installed on the provider or vendor information system. Organizations typically have an on-demand or pay-per-usage metrics. What is the goal of a security test? - CORRECT ANSWER-Verify that a control is functioning properly. What is a security assessment? - CORRECT ANSWER-A comprehensive reviews of the security of a system, application, or other tested environment What is the NIST SP 800-53A? - CORRECT ANSWER-The National Institute for Standards and Technology (NIST) offers a special publication that describes best practices in conducting security and privacy assessments. What is COBIT? - CORRECT ANSWER-the Control Objectives for Information and related Technologies describes the common requirements that organizations should have in place surrounding their information systems. What does ISO 27001 describe? - CORRECT ANSWER-A standard approach for setting up an information security management system What does ISO 27002 describe? - CORRECT ANSWER-It details specifics of information security controls What does a vulnerability scan do? - CORRECT ANSWER-automatically probe systems, applications, and networks, looking for weaknesses that may be exploited by an attacker. What are the four main categories of vulnerability scans? - CORRECT ANSWER-Network discovery scans, network vulnerability scans, web application vulnerability scans, and database vulnerability scans What is NMAP? - CORRECT ANSWER-The most common tool used for network discovery scanning What does a network vulnerability scanner do? - CORRECT ANSWER-Probe a targeted system or network for the presence of known vulnerabilities. What is a false positive? - CORRECT ANSWER-The scanner may not have enough information to conclusively determine that a vulnerability exists and it reports a vulnerability when there really is no problem. What is a false negative? - CORRECT ANSWER-When the vulnerability scanner misses a vulnerability and fails to alert the administrator to the presence of it T/F - By default, network vulnerability scanners run unauthenticated scans. - CORRECT ANSWER-True One way to improve the accuracy of the scanning and reduce false positive and false negative reports is to perform what kind of scans? - CORRECT ANSWER-authenticated scans What is sqlmap? - CORRECT ANSWER-A commonly used open-source database vulnerability scanner that allows security administrators to probe web applications for database vulnerabilities What is Metasploit? - CORRECT ANSWER-a tool to automatically execute exploits against targeted systems What is a white box penetration test? - CORRECT ANSWER-Provides the attackers with detailed information about the systems they target. This bypasses many of the reconnaissance steps that normally precede attacks, shortening the time of the attack and increasing the likelihood that it will find security flaws. What is a gray box penetration test? - CORRECT ANSWER-Also known as partial knowledge tests, these are sometimes chosen to balance the advantages and disadvantages of white and black box penetration tests. What is a black box penetration test? - CORRECT ANSWER-Does not provide attackers with any information prior to the attack. This simulates an external attacker trying to gain access to information about the business and technical environment before engaging in an attack. What is static testing? - CORRECT ANSWER-Evaluates the security of software without running it by analyzing either the source code or the compiled application. What is dynamic testing? - CORRECT ANSWER-Evaluates the security of software in a runtime environment and is often the only option for organizations deploying applications written by someone else. What is fuzz testing? - CORRECT ANSWER-A specialized dynamic testing technique that provides many different types of input to software to stress its limits and find previously undetected flaws. What is bit flipping? - CORRECT ANSWER-The process of slightly manipulating the input What is misuse case or abuse case testing? - CORRECT ANSWER-Testing to evaluate the vulnerability of software to known risks due to misuse What is passive monitoring? - CORRECT ANSWER-Analyzes actual network traffic sent to a website by capturing it as it travels over the network or reaches the server. What is synthetic/active monitoring? - CORRECT ANSWER-Performs artificial transactions against a website to assess performance. What is a SIEM and what does it support? - CORRECT ANSWER-Security Information and event management supports log reviews; it collects information using the syslog functionality present in many devices, operating systems, and applications. What is an account management review? - CORRECT ANSWER-Ensures that users only retain authorized permissions and that unauthorized modifications do not occur. What is backup verification? - CORRECT ANSWER-Managers should periodically inspect the results of backups to ensure that the process functions effectively and meets the organization's data protection needs. This may involve reviewing logs, inspecting hash values, or requesting an actual restore of a system or file.

Show more Read less
Institution
CYBERSECURITY II
Course
CYBERSECURITY II










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CYBERSECURITY II
Course
CYBERSECURITY II

Document information

Uploaded on
April 10, 2025
Number of pages
16
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

‭ 025-2026 LATEST CYBERSECURITY II‬
2
‭MANAGEMENT UPDATED EXAMS‬
‭WITH Q&A 100% ACCURATE‬
‭ANSWERS {CLEANEST VERSION}‬

‭ hat is a vulnerability? - CORRECT ANSWER-a weakness in an information system,‬
W
‭system security procedures, internal controls, or implementation that could be exploited‬
‭or triggered by a threat source.‬

‭ hat is a penetration test? - CORRECT ANSWER-a simulated cyber attack against‬
W
‭your systems or company‬

‭ hat are the typical steps for a vulnerability test? - CORRECT ANSWER-Identify asset‬
W
‭classification list, identify vulnerabilities, test assets against vulnerabilities, and‬
‭recommend solutions to either eliminate or mitigate vulnerabilities‬

‭ hat is the first thing an organization should do before defining security requirements? -‬
W
‭CORRECT ANSWER-To define security requirements, first an organization must define‬
‭its risk appetite.‬

‭ hat is defense in depth? - CORRECT ANSWER-defense-in-depth principle; it is by‬
W
‭adding relevant layer of controls (e.g., access control, encryption, and monitoring) that‬
‭the expected level of protection is achieved.‬

‭ hat are COTS applications? - CORRECT ANSWER-Applications developed by‬
W
‭vendors and installed on the organization's information systems. These applications are‬
‭usually purchased outright by organizations with usage based on licensing agreements.‬

‭ hat are SaaS applications? - CORRECT ANSWER-Applications developed by‬
W
‭service providers or vendors and installed on the provider or vendor information system.‬
‭Organizations typically have an on-demand or pay-per-usage metrics.‬

‭ hat is the goal of a security test? - CORRECT ANSWER-Verify that a control is‬
W
‭functioning properly.‬

,‭ hat is a security assessment? - CORRECT ANSWER-A comprehensive reviews of‬
W
‭the security of a system, application, or other tested environment‬

‭ hat is the NIST SP 800-53A? - CORRECT ANSWER-The National Institute for‬
W
‭Standards and Technology (NIST) offers a special publication that describes best‬
‭practices in conducting security and privacy assessments.‬

‭ hat is COBIT? - CORRECT ANSWER-the Control Objectives for Information and‬
W
‭related Technologies describes the common requirements that organizations should‬
‭have in place surrounding their information systems.‬

‭ hat does ISO 27001 describe? - CORRECT ANSWER-A standard approach for‬
W
‭setting up an information security management system‬

‭ hat does ISO 27002 describe? - CORRECT ANSWER-It details specifics of‬
W
‭information security controls‬

‭ hat does a vulnerability scan do? - CORRECT ANSWER-automatically probe‬
W
‭systems, applications, and networks, looking for weaknesses that may be exploited by‬
‭an attacker.‬

‭ hat are the four main categories of vulnerability scans? - CORRECT‬
W
‭ANSWER-Network discovery scans, network vulnerability scans, web application‬
‭vulnerability scans, and database vulnerability scans‬

‭ hat is NMAP? - CORRECT ANSWER-The most common tool used for network‬
W
‭discovery scanning‬

‭ hat does a network vulnerability scanner do? - CORRECT ANSWER-Probe a‬
W
‭targeted system or network for the presence of known vulnerabilities.‬

‭ hat is a false positive? - CORRECT ANSWER-The scanner may not have enough‬
W
‭information to conclusively determine that a vulnerability exists and it reports a‬
‭vulnerability when there really is no problem.‬

‭ hat is a false negative? - CORRECT ANSWER-When the vulnerability scanner‬
W
‭misses a vulnerability and fails to alert the administrator to the presence of it‬

‭ /F - By default, network vulnerability scanners run unauthenticated scans. -‬
T
‭CORRECT ANSWER-True‬

, ‭ ne way to improve the accuracy of the scanning and reduce false positive and false‬
O
‭negative reports is to perform what kind of scans? - CORRECT‬
‭ANSWER-authenticated scans‬

‭ hat is sqlmap? - CORRECT ANSWER-A commonly used open-source database‬
W
‭vulnerability scanner that allows security administrators to probe web applications for‬
‭database vulnerabilities‬

‭ hat is Metasploit? - CORRECT ANSWER-a tool to automatically execute exploits‬
W
‭against targeted systems‬

‭ hat is a white box penetration test? - CORRECT ANSWER-Provides the attackers‬
W
‭with detailed information about the systems they target. This bypasses many of the‬
‭reconnaissance steps that normally precede attacks, shortening the time of the attack‬
‭and increasing the likelihood that it will find security flaws.‬

‭ hat is a gray box penetration test? - CORRECT ANSWER-Also known as partial‬
W
‭knowledge tests, these are sometimes chosen to balance the advantages and‬
‭disadvantages of white and black box penetration tests.‬

‭ hat is a black box penetration test? - CORRECT ANSWER-Does not provide‬
W
‭attackers with any information prior to the attack. This simulates an external attacker‬
‭trying to gain access to information about the business and technical environment‬
‭before engaging in an attack.‬

‭ hat is static testing? - CORRECT ANSWER-Evaluates the security of software‬
W
‭without running it by analyzing either the source code or the compiled application.‬

‭ hat is dynamic testing? - CORRECT ANSWER-Evaluates the security of software in‬
W
‭a runtime environment and is often the only option for organizations deploying‬
‭applications written by someone else.‬

‭ hat is fuzz testing? - CORRECT ANSWER-A specialized dynamic testing technique‬
W
‭that provides many different types of input to software to stress its limits and find‬
‭previously undetected flaws.‬

‭ hat is bit flipping? - CORRECT ANSWER-The process of slightly manipulating the‬
W
‭input‬
$20.48
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
ProfJohnDutton
5.0
(1)

Get to know the seller

Seller avatar
ProfJohnDutton MARRYVILLE UNIVERSITY OF ST LOUIS MISSOURI
View profile
Follow You need to be logged in order to follow users or courses
Sold
2
Member since
1 year
Number of followers
0
Documents
621
Last sold
3 months ago
EXAMS FLASHCARDS,STUDY SETS,QUIZZES ....YOU NAME IT!!!! BY YOUR PROFESSIONAL TUTOR

Home of all study & revision Materials. Explore excellent RETAKES ASSIGNMENTS CATS TESTS EXAMS and authentic solutions for your academic challenges email me or REVIEW For Any Inquiries 24/7

5.0

1 reviews

5
1
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions