Chain of custody A firewall that tracks open connection -oriented protocol sessions is said to be: - Answer -Stateful During which phase of the system development lifecycle (SDLC) should security first be considered? - Answer -Planning A cybersecurity architecture designed around the concept of a perimeter is said to be: - Answer -System -
centric A passive network hub operates at which layer of the OSI model? - Answer -Physical Updates in cloud -computing environments can be rolled out quickly because the environment is: - Answer -homogeneous During which phase of the six -phase incident response model is the root cause determined? - Answer -
Eradication The attack mechanism directed against a system is commonly called a(n): - Answer -Payload Where should an organization's network terminate virtual private network (VPN) tunnels? - Answer -At the perimeter, to allow for effective internal monitoring In practical applications: - Answer -Asymmetric key encryption is used to securely obtain symmetric keys Which two factors are used to calculate the likelihood of an event? - Answer -Threat and vulnerability What kind of anti -malware program evaluates system processes based on their observed behaviors? - Answer -Heuristic A business continuity plan (BCP) is not complete unless it includes: - Answer -detailed procedures Under the US -CERT model for incident categorization, a CAT -3 incident refers to which of the following? - Answer -Malicious code An interoperability error is what type of vulnerability? - Answer -Emergent