Lab 1
1. All of these
1. Start, Settings, System, and then About
7
Question
Which of the following are the phases in Open Source Intelligence (OSINT)? [Choose all that apply]
Correct
7
Question
Which of the following allows organizations to identify and remediate vulnerabilities before the public is aware of it, thus reducing the spread and intensity of abuse?
Correct
After Bella earned her security certification, she was offered a promotion. As she reviewed the job responsibilities, she saw that in this position she will report to the CISO and will be a supervisor over a group of security technicians. Which of these generally recognized security positions has she been offered?
Hide Feedback
Correct
Which of the following is false about the CompTIA Security+ certification?
Hide Feedback
Correct
Which of the following is true regarding the relationship between security and convenience?
Hide Feedback
Correct
Which of the following of the CIA Triad ensures that the information is correct, and no unauthorized person has altered it?
Hide Feedback
Incorrect
Which of the following is not used to describe those who attack computer systems?
Hide Feedback
Correct
Which of the following is not true regarding security?
Hide Feedback
Correct
Luna is reading a book about the history of cybercrime. She read that the very first cyberattacks that occurred were mainly for what purpose?
Hide Feedback
Correct
Which of the following ensures that only authorized parties can view protected information?
Hide Feedback
Incorrect
Which type of hacker will probe a system for weaknesses and then privately provide that information back to the organization?
Hide Feedback
Correct
omplete this definition of information security: That which protects the integrity, confidentiality, and availability of information _____.
Hide Feedback
Correct
Which of the following groups have the lowest level of technical knowledge?
Hide Feedback
Correct
Which of the following groups use Advanced Persistent Threats?
Hide Feedback
Correct
Which of the following is not a reason why a legacy platform has not been updated?
Hide Feedback
Correct
How do vendors decide which should be the default settings on a system?
Hide Feedback
Correct
Which tool is most commonly associated with state actors?
Hide Feedback
Correct
What is the term used to describe the connectivity between an organization and a third party?
Hide Feedback
Correct
What is an objective of state-sponsored attackers?
Hide Feedback
Correct
Which of the following is not an issue with patching?
Hide Feedback
Correct
Which of the following is not a recognized attack vector?
Hide Feedback
Correct
What is the category of threat actors that sell their knowledge of vulnerabilities to other attackers or governments?
Hide Feedback
Correct
Ebba has received a new initiative for her security team to perform an in-house penetration test. What is the first step that Ebba should undertake?
Hide Feedback
Correct
Which of the following is NOT a characteristic of a penetration test?
Hide Feedback
Correct
Linnea has requested to be placed on the penetration testing team that scans for vulnerabilities to exploit them. Which team does she want to be placed on?
Hide Feedback
Correct
Lykke's supervisor is evaluating whether to use internal security employees to conduct a penetration test. Lykke does not consider this a good idea and has created a memo with several reasons they should not be used. Which of the following would NOT be part of that memo?
Hide Feedback
Correct
What penetration testing level name is given to testers who have no knowledge of the network and no special privileges?
Hide Feedback
Correct
Which of the following is NOT an advantage of crowdsourced penetration testing?
Hide Feedback
Correct
Tilde is working on a contract with the external penetration testing consultants. She does not want any executives to receive spear-phishing emails. Which rule of engagement would cover this limitation?
Hide Feedback
Correct
Which is the final rule of engagement that would be conducted in a pen test?
Hide Feedback
Correct
What is another name for footprinting?
Hide Feedback
Correct
When researching how an attack recently took place, Nova discovered that the threat actor, after penetrating the system, started looking to move through the network with their elevated position. What is the name of this technique?
Hide Feedback
Correct
What are documents that are authored by technology bodies employing specialists, engineers, and scientists who are experts in those areas?
Hide Feedback
Correct
Which of the following is NOT a general information source that can provide valuable in-depth information on cybersecurity?
Hide Feedback
Correct
Which of the following is a standard for the handling of customer card information?
Hide Feedback
Correct
Which of the following are developed by established professional organizations or government agencies using the expertise of seasoned security professionals?
Hide Feedback
Correct
Which group is responsible for the Cloud Controls Matrix?
Hide Feedback
Correct
Tuva's supervisor wants to share a recent audit outside the organization. Tuva warns him that this type of audit can only be read by those within the organization. What audit does Tuva's supervisor want to distribute?
Hide Feedback
Correct
Which ISO contains controls for managing and controlling risk?
Hide Feedback
Correct
Which premise is the foundation of threat hunting?
Hide Feedback
Correct
Which of the following can automate an incident response?
Hide Feedback
Correct
Which of the following is not something that a SIEM can perform?
Hide Feedback
Correct
Comments
Post a Comment