ACTUAL Exam Questions and CORRECT
Answers
Privileged user management - CORRECT ANSWER Permits authorized users to maintain and
protect systems and networks. They can modify or circumvent existing safeguards such as access
controls or logging
payload - CORRECT ANSWER container, that delivers the exploit to the target
What are the six control objectives of PCI DSS? - CORRECT ANSWER 1) build and
maintain a secure network
2) protect card holder data
3) maintain a vulnerability management program
4) implement strong access control measures
5) regularly monitor and test networks
6) maintain an information security policy
Buffer overflow - CORRECT ANSWER When a program or process tries to store more data
in a buffer (temporary data storage area) than it was intended to hold.
Botnets - CORRECT ANSWER A large automated and distributed network previously
compromised computers that can be simultaneously controlled to launch large-scale attacks such
as denial of service
, What are the three elements of the cyber security role? - CORRECT ANSWER 1)
Governance
2) Risk
3) Compliance
Network Worm - CORRECT ANSWER A piece of self replicating code designed to spread
itself across computer networks. It does not require intervention for execution to replicate.
Denial of service attack - CORRECT ANSWER An assault on the service from a single
source that floods it with so many request that it becomes overwhelmed and is either stopped
completely or operates at a significantly reduced rate.
Phishing - CORRECT ANSWER A type of electronic mail attack that attempts to convince
the user that the originator is genuine, but with the intention of obtaining information for use in
social engineering.
Backdoor - CORRECT ANSWER A means of regaining access to a compromised system by
installing software or configuring existing software to enable remote access under attacker
defined conditions.
Link File - CORRECT ANSWER Propagates copies of the worm
Five key functions necessary for the protection of digital assets - CORRECT ANSWER 1)
identify
2) protect
3) detect
4) respond
5) recover
Threat - CORRECT ANSWER Anything that is capable of acting against an asset in a manner
that can result in harm