Practice Questions with Accurate
Answers
- Accounting management
- Fault management
- Performance management
- Security management correct answer What are considered functional areas of
network management as defined by ISO?
- an intruder must penetrate three separate devices
- private network addresses are not disclosed to the internet
- internal systems do not have direct access to the Internet correct answer The
key benefits of the DMZ system are:
- APTs typically originate from sources such as organized crime groups, activists or
governments.
- APTs use obfuscation techniques that help them remain undiscovered for
months or even years.
- APTs are often long-term, multi-phase projects with a focus on reconnaissance.
correct answer Which of the following statements about advanced persistent
threats (APTs) are true?
- cloud computing
- social media
,- mobile computing correct answer Which three elements of the current threat
landscape have provided increased levels of access and connectivity, and
therefore increased opportunities for cybercrime
- Costs shift to the user
- Worker satisfaction increases correct answer Which of the following are benefits
to BYOD?
- detect and block traffic from infected internal end points
- eliminate threats such as email spam, viruses and worms
- control user traffic bound toward the Internet
- monitor internal and external network ports for rogue activity correct answer
The Internet perimeter should:
- full
- incremental
- differential correct answer Types of backups
- Identify
- Protect
- Detect
- Respond
- Recover correct answer According to the NIST cybersecurity framework, what
are considered key functions necessary for the protection of digital assets?
- Logging
, - Digital Signatures
- Hashes
- Encryption correct answer Methods of control that can help protect integrity
- Organizational risk
- Technical risk
- Physical risk correct answer Choose three. Which types of risk are typically
associated with mobile devices?
- Planning
- Discovery
- Attack
- Reporting correct answer The steps of the penetration testing phase in the
correct order are:
- Preparation
- Detection and analysis
- Investigation
- Mitigation and recovery
- Post-incident analysis correct answer The steps of incident response in order
are:
- Protect,
- Recover
- Identify correct answer According to the NIST framework, which of the following
are considered key functions necessary for the protection of digital assets?