Module 13 HW

9 September 2022
4.7 (114 reviews)
87 test answers

Unlock all answers in this set

Unlock answers (83)
question
D. Threat evaluation
answer
1. At what point in a vulnerability assessment would an attack tree be utilized? A. Vulnerability appraisal B. Risk assessment C. Risk mitigation D. Threat evaluation
question
A. Today, individuals can achieve any level of privacy that is desired.
answer
2. Which of the following is NOT true about privacy? A. Today, individuals can achieve any level of privacy that is desired. B. Privacy is difficult due to the volume of data silently accumulated by technology. C. Privacy is freedom from attention, observation, or interference based on your decision. D. Privacy is the right to be left alone to the degree that you choose.
question
D. Devices being infected with malware
answer
3. Which of the following is NOT a risk associated with the use of private data? A. Individual inconveniences and identity theft B. Associations with groups C. Statistical inferences D. Devices being infected with malware
question
B. By law, all encrypted data must contain a "backdoor" entry point.
answer
4. Which of the following is NOT an issue raised regarding how private data is gathered and used? A. The data is gathered and kept in secret. B. By law, all encrypted data must contain a "backdoor" entry point. C. Informed consent is usually missing or is misunderstood. D. The accuracy of the data cannot be verified.
question
A. Vulnerability assessment
answer
5. Which of the following is a systematic and methodical evaluation of the exposure of assets to attackers, forces of nature, and any other entity that could cause potential harm? A. Vulnerability assessment B. Penetration test C. Vulnerability scan D. Risk appraisal
question
D. Accounts payable
answer
6. Which of these should NOT be classified as an asset? A. Business partners B. Buildings C. Employee databases D. Accounts payable
question
B. Ping
answer
7. Which of the following command-line tools tests a connection between two network devices? A. Netstat B. Ping C. Nslookup D. Ifconfig
question
A. Vulnerability appraisal is always the easiest and quickest step.
answer
8. Which statement regarding vulnerability appraisal is NOT true? A. Vulnerability appraisal is always the easiest and quickest step. B. Every asset must be viewed in light of each threat. C. Each threat could reveal multiple vulnerabilities. D. Each vulnerability should be cataloged.
question
D. Threat modeling
answer
9. Which of the following constructs scenarios of the types of threats that assets can face to learn who the attackers are, why they attack, and what types of attacks may occur? A. Vulnerability prototyping B. Risk assessment C. Attack assessment D. Threat modeling
question
B. Tcpdump
answer
10. Which of the following tools is a Linux command-line protocol analyzer? A. Wireshark B. Tcpdump C. IP D. Arp
question
A. Netcat
answer
11. Which of the following is a command-line alternative to Nmap? A. Netcat B. Statnet C. Mapper D. Netstat
question
B. Busy
answer
12. Which of these is NOT a state of a port that can be returned by a port scanner? A. Open B. Busy C. Blocked D. Closed
question
B. Confidential
answer
13. Which of the following data sensitivity labels is the highest level of data sensitivity? A. Ultra B. Confidential C. Private D. Secret
question
B. Public
answer
14. Which of the following data sensitivity labels has the lowest level of data sensitivity? A. Unrestricted B. Public C. Free D. Open
question
B. Alerts users when a new patch cannot be found
answer
15. Which of the following is NOT a function of a vulnerability scanner? A. Detects which ports are served and which ports are browsed for each individual system B. Alerts users when a new patch cannot be found C. Maintains a log of all interactive network sessions D. Detects when an application is compromised
question
B. PHI
answer
16. Which of the following must be kept secure as mandated by HIPAA? A. PII B. PHI C. PHIL D. PLILP
question
C. It cannot be part of a honeynet.
answer
17. Which statement regarding a honeypot is NOT true? A. It is typically located in an area with limited security. B. It is intentionally configured with security vulnerabilities. C. It cannot be part of a honeynet. D. It can direct an attacker's attention away from legitimate servers.
question
A. Active scanner
answer
18. Which of the following sends "probes" to network devices and examines the responses to evaluate whether a specific device needs remediation? A. Active scanner B. Probe scanner C. Passive scanner D. Remote scanner
question
B. White box
answer
19. If a tester is given the IP addresses, network diagrams, and source code of customer applications, the tester is using which technique? A. Black box B. White box C. Gray box D. Blue box
question
C. Fail-open
answer
20. If a software application aborts and leaves the program open, which control structure is it using? A. Fail-safe B. Fail-secure C. Fail-open D. Fail-right
question
B. IT contingency planning
answer
1. Raul has been asked to help develop an outline of procedures to be followed in the event of a major IT incident or an incident that directly impacts IT. What type of planning is this? A. Disaster recovery planning B. IT contingency planning C. Business impact analysis planning D. Risk IT planning
question
B. To secure the crime scene
answer
20. When an unauthorized event occurs, what is the first duty of the cyber-incident response team? A. To log off from the server B. To secure the crime scene C. To back up the hard drive D. To reboot the system
question
C. Recovery point objective (RPO)
answer
18. What is the maximum length of time that an organization can tolerate between data backups? A. Recovery time objective (RTO) B. Recovery service point (RSP) C. Recovery point objective (RPO) D. Optimal recovery timeframe (ORT)
question
C. custody
answer
17. The chain of _____ documents that the evidence was under strict control at all times and no unauthorized person was given the opportunity to corrupt the evidence. A. forensics B. evidence C. custody D. control
question
B. How long will it take to finish the backup?
answer
16. Which question is NOT a basic question to be asked regarding creating a data backup? A. What media should be used? B. How long will it take to finish the backup? C. Where should the backup be stored? D. What information should be backed up?
question
A. Copies all files changed since the last full or incremental backup
answer
15. What does an incremental backup do? A. Copies all files changed since the last full or incremental backup B. Copies selected files C. Copies all files D. Copies all files since the last full backup
question
B. It is a private document used only by top-level administrators for planning.
answer
14. Which of these is NOT a characteristic of a disaster recovery plan (DRP)? A. It is updated regularly. B. It is a private document used only by top-level administrators for planning. C. It is written. D. It is detailed.
question
active reconnaissance
answer
Actively probing a sys-tem like an attacker would do to find information.
question
active scanner
answer
A vulnerability scanner that sends "probes" to network devices and examine the responses received back to evaluate whether a specific device needs remediation.
question
banner grabbing
answer
Gathering information from messages that a service transmits when another program connects to it.
question
black box
answer
A penetration test in which the tester has no prior knowledge of the network infrastructure that is being tested.
question
burning
answer
Lighting paper on fire to destroy the data printed on it.
question
confidential
answer
The highest data label level of sensitivity.
question
configuration compliance scanner
answer
A device that can evaluate and report any compliance issues related to specific industry guidelines.
question
credentialed vulnerability scan
answer
A scan that provides credentials (user name and password) to the scanner so that tests for additional internal vulnerabilities can be performed.
question
data retention
answer
How long data must be kept and how it is to be secured.
question
data sanitation tools
answer
Tools that can be employed to securely remove data from electronic media.
question
data sensitivity labeling
answer
Applying the correct category to data to ensure proper data handling.
question
degaussing
answer
Permanently destroying a hard drive by reducing or eliminating the magnetic field.
question
Dig
answer
A Linux command-line alternative to Nslookup.
question
exploitation framework
answer
A structure of exploits and monitoring tools used to replicate attacks during a vulnerability assessment.
question
gray box
answer
A penetration test where some limited information has been provided to the tester.
question
honeynet
answer
A network set up with intentional vulnerabilities to invite attacks and reveal attackers' methods.
question
honeypot
answer
A computer typically located in an area with limited security and loaded with soft-ware and data files that appear to be authentic, but are actually imitations of real data files, to trick attackers into revealing their attack techniques.
question
identify a lack of security controls
answer
A vulnerability scan that looks for missing controls to establish a secure framework.
question
identify common misconfigurations
answer
A vulnerability scan that looks for misapplied set-tings in hardware and software.
question
identify vulnerabilities
answer
A vulnerability scan that looks to identify security weaknesses in a system.
question
initial exploitation
answer
Using information acquired to determine if it provides entry to the secure network.
question
intrusive vulnerability scan
answer
A scan that attempts to penetrate the system in order to perform a simulated attack.
question
IP and Ifconfig
answer
Linux implementations of Ipconfig.
question
Ipconfig
answer
A command-line utility that displays all current TCP/IP network configuration values and refreshes Dynamic Host Configuration Protocol (DHCP) and DNS settings.
question
legal and compliance issues
answer
Following the requirements of legislation, prescribed rules and regulations, specified standards, or the terms of a contract.
question
Netcat
answer
A command-line alternative to Nmap with additional features scanning for vulnerabilities.
question
Netstat
answer
A command-line utility that can display detailed information about how a device is communicating with other network devices.
question
network mapping scanner
answer
A device that combines network device discovery tools and network scanners to find open ports or discover shared folders.
question
Nmap
answer
A security vulnerability scanner that can determine which devices are connected to the network and the services they are running.
question
non-credentialed vulnerability scan
answer
A scan that does not use credentials (user name and password) to conduct an internal vulnerability assessment.
question
non-intrusive vulnerability scan
answer
A scan that uses only available information to hypothesize the status of the vulnerability.
question
Nslookup
answer
A command-line utility that can query the Domain Name System (DNS) to obtain a specific domain name or IP address mapping.
question
passive reconnaissance
answer
Using searches online for publicly accessible information that can reveal valuable insight about a system.
question
passive scanner
answer
A vulnerability scanner that can identify the current software operating systems and applications being used on the network, and indicate which devices might have a vulnerability.
question
passively testing security controls
answer
A vulnerability scan that does not attempt to exploit any weaknesses that it finds but only reports back what it uncovers.
question
password cracker
answer
Software intended to break the digest of a password to determine its strength.
question
penetration testing
answer
A test (pentest) by an out-sider that attempts to actually exploit any weak-nesses in systems that are vulnerable.
question
persistance
answer
The characteristic of endurance to continue to probe for weaknesses and exploit them.
question
Personally Identifiable Information (PII)
answer
Data that could potentially identify a specific individual.
question
Ping
answer
A command-line utility to test the connection between two network devices.
question
pivot
answer
Moving around inside the network to other resources.
question
privacy
answer
The state or condition of being free from public attention to the degree that you determine.
question
private
answer
A data label for restricted data with a medium level of confidentiality.
question
proprietary
answer
A data label indicating the data belongs to the enterprise.
question
Protected Health Information (PHI)
answer
Data about a person's health status, provision of health care, or payment for health care.
question
protocol analyzer
answer
Hardware or software that captures packets to decode and analyze their contents.
question
public
answer
A data label for the lowest level of data sensitivity.
question
pulping
answer
Breaking paper back into wood cellulose fibers after the ink is removed.
question
pulverizing
answer
Hammering paper into dust.
question
purging
answer
Erasing data using the operating system "delete" command.
question
shredding
answer
Cutting paper into small strips or particles.
question
stenography assessment tools
answer
Tools that can be used to determine if data is hidden well enough in an image, audio, or video file to thwart unauthorized users from finding the data.
question
Tcpdump
answer
A Linux command-line protocol analyzer.
question
Tracert
answer
A command-line utility that shows the path that a packet takes.
question
vulnerability scan
answer
An automated software search through a system for any known security weaknesses that creates a report of those potential exposures.
question
vulnerability scanner
answer
Generic term for a range of products that look for vulnerabilities in net-works or systems.
question
white box
answer
A penetration test where the tester has an in-depth knowledge of the network and systems being tested, including network diagrams, IP addresses, and even the source code of custom applications.
question
wiping
answer
Overwriting disk space with zeros or random data.
question
wireless cracker
answer
Hardware or software that tests the security of a wireless LAN system by attempting to break its protections of Wi-Fi Protected Access (WPA) or Wi-Fi Protected Access 2 (WPA2).
question
wireless scanner
answer
A device that can discover malicious wireless network activity such as failed login attempts, record these to an event log, and alert an administrator.