Skip to main content

IS5403 New Week 1

 Lab 1

1. All of these

2. Nothing

3. Microsoft Edge

4. Windows Sandbox

5. Changes are lost

Lab 2

1. Start, Settings, System, and then About

2. the installation halts

3. Directly from the browser

4. Quick scan

5. 0

Lab 3

2
Question

Which type of attack does the attacker infect a website that is often visited by the target users?

Correct
 
2 of 7
3
Question

Which type of phishing is conducted over the Voice over IP (VoIP) lines where the attacker pretends to be a legitimate caller from a bank or a financial institution?

Correct
 
3 of 7
4
Question

Which type of phishing targets specific individuals and companies?

Correct
 
4 of 7
5
Question

You received a call from a person who was pretending to be from a law firm. The caller wanted to know some confidential information about your organization. Which of the following social engineering method was the person using?

Correct
 
5 of 7
6
Question

Which of the following attack uses CDs, DVDs, or USB drives?

Correct
3
Question

Which of the following type of attacker keeps exfiltrating the data quietly, without being detected?

Correct
 
3 of 8
4
Question

Which of the following performs hacking for either a political reason or wants to bring in a social change?

Correct
 
4 of 8
5
Question

Which type of hackers break into systems for personal or financial gain?

Correct
 
5 of 8
6
Question

Insider threats are generated by the individuals who are either the organization's employees or are closely associated with the organization as a vendor or a third-party. [TRUE/FALSE]

Correct
 
6 of 8
7
Question

Which of the following are the phases in Open Source Intelligence (OSINT)? [Choose all that apply]

Correct
2
Question

In which of the following tests does the tester not need to have prior knowledge of the system's internal design or features?

Correct
 
2 of 8
3
Question

Which of the following testing strategies will be performed by a gradual process of gaining access to a network component, infrastructure, or an application layer to minimize detection?

Correct
 
3 of 8
4
Question

Which of the following is a full knowledge penetration testing?

Correct
 
4 of 8
5
Question

Footprinting and gathering information about the target is performed in which phase of penetration testing?

Correct
 
5 of 8
6
Question

Which of the following terms refers to attacking or taking control of a system through another compromised system?

Correct
 
6 of 8
7
Question

Which of the following allows organizations to identify and remediate vulnerabilities before the public is aware of it, thus reducing the spread and intensity of abuse?

Correct
1
Question

Which of the following are examples of technical control? [Choose all that apply]

Correct
 
1 of 6
2
Question

Which type of control identifies a security risk that might be present in a policy, process, or procedure?

Correct
 
2 of 6
3
Question

Which of the following standard/law focuses on protecting the financial non-public information?

Correct
 
3 of 6
4
Question

Which of the following ISO framework provides requirements for an information security management system and focuses on managing information security within an organization?

Correct
 
4 of 6
5
Question

Which of the following standards provide guidelines for hardening a Webserver?

Correct
After Bella earned her security certification, she was offered a promotion. As she reviewed the job responsibilities, she saw that in this position she will report to the CISO and will be a supervisor over a group of security technicians. Which of these generally recognized security positions has she been offered?
Correct


Which of the following is false about the CompTIA Security+ certification?
Correct
Which of the following is true regarding the relationship between security and convenience?
Correct
Which of the following of the CIA Triad ensures that the information is correct, and no unauthorized person has altered it?
Incorrect
Which of the following is not used to describe those who attack computer systems?
Correct
Which of the following is not true regarding security?
Correct
Luna is reading a book about the history of cybercrime. She read that the very first cyberattacks that occurred were mainly for what purpose?
Correct
Which of the following ensures that only authorized parties can view protected information?
Incorrect
Which type of hacker will probe a system for weaknesses and then privately provide that information back to the organization?
Correct
omplete this definition of information security: That which protects the integrity, confidentiality, and availability of information _____.
Correct
Which of the following groups have the lowest level of technical knowledge?
Correct
Which of the following groups use Advanced Persistent Threats?
Correct
Which of the following is not a reason why a legacy platform has not been updated?
Correct
How do vendors decide which should be the default settings on a system?
Correct
Which tool is most commonly associated with state actors?
Correct
What is the term used to describe the connectivity between an organization and a third party?
Correct
What is an objective of state-sponsored attackers?
Correct
Which of the following is not an issue with patching?
Correct
Which of the following is not a recognized attack vector?
Correct
What is the category of threat actors that sell their knowledge of vulnerabilities to other attackers or governments?
Correct
Ebba has received a new initiative for her security team to perform an in-house penetration test. What is the first step that Ebba should undertake?
Correct
Which of the following is NOT a characteristic of a penetration test?
Correct
Linnea has requested to be placed on the penetration testing team that scans for vulnerabilities to exploit them. Which team does she want to be placed on?
Correct
Lykke's supervisor is evaluating whether to use internal security employees to conduct a penetration test. Lykke does not consider this a good idea and has created a memo with several reasons they should not be used. Which of the following would NOT be part of that memo?
Correct
What penetration testing level name is given to testers who have no knowledge of the network and no special privileges?
Correct
Which of the following is NOT an advantage of crowdsourced penetration testing?
Correct
Tilde is working on a contract with the external penetration testing consultants. She does not want any executives to receive spear-phishing emails. Which rule of engagement would cover this limitation?
Correct
Which is the final rule of engagement that would be conducted in a pen test?
Correct
What is another name for footprinting?
Correct
When researching how an attack recently took place, Nova discovered that the threat actor, after penetrating the system, started looking to move through the network with their elevated position. What is the name of this technique?
Correct
What are documents that are authored by technology bodies employing specialists, engineers, and scientists who are experts in those areas?
Correct
Which of the following is NOT a general information source that can provide valuable in-depth information on cybersecurity?
Correct
Which of the following is a standard for the handling of customer card information?
Correct
Which of the following are developed by established professional organizations or government agencies using the expertise of seasoned security professionals?
Correct
Which group is responsible for the Cloud Controls Matrix?
Correct
Tuva's supervisor wants to share a recent audit outside the organization. Tuva warns him that this type of audit can only be read by those within the organization. What audit does Tuva's supervisor want to distribute?
Correct
Which ISO contains controls for managing and controlling risk?
Correct
Which premise is the foundation of threat hunting?
Correct
Which of the following can automate an incident response?
Correct





Which of the following is not something that a SIEM can perform?
Correct


































































































Comments

Popular posts from this blog

IS5203 Type 2 Post Assessment and Final Quiz

  Carlos has just created a new subnet for the finance department. He needs to be able to allow the employees in finance to retrieve files from the sales server, which is located in another subnet. Which of the following OSI model layers would it be necessary to categorize the device into? a. Layer 4 b. Layer 6 c. Layer 2 d. Layer 3 All of the cubicles in a company's office have cables that run up to the ceiling and across to an IDF. Inside the IDF, they connect directly to the latest generation switch available from the networking equipment vendor that they have chosen. Which of the following describes the physical topology most likely in use? a. mesh

GE5103-2 Project Management [Aug 23 Syllabus]

    Some of the advantages of using time boxes and cycles in project coordination efforts include creating urgency, measuring progress, and allowing for predictable measurements. A)        True 2.    Even though most project managers are not contract specialists, they need to understand the process well enough to coordinate with the team. For the current assignment, you are looking at a short-term and small effort with a contractor of just a few hours without significant clarity. Which of the following would be the most applicable contract to use in this situation? A)        Time and materials 3. The project you are working on has had modifications to the plan from the start and even how the project is run. Project governance covers all of the 3 following except: A)        Naming The project manager 4. Of the following, which is most likely a trigger condition defined early in the project? A) Alerting Governance board if 10 percent over schedule 5. Of the following options, which stand

GE5163 Week8 ( Final Exam ) Quize's

  A process or product that is insensitive to normal variation is referred to as being Select one: a. in specification b. capable c. robust d. out of control Feedback Your answer is correct. A completed failure mode and effects analysis (FMEA) results in the following assessment rating.      Occurrence = 4      Severity = 8      Detection = 10 What is the risk priority number (RPN) for this FMEA? Select one: a. 42 b. 22 c. 320 d. 120 Feedback Your answer is correct. In a visual inspection situation, one of the best ways to minimize deterioration of the quality level is to: Select one: a. have a program of frequent eye exams. b. retrain the inspector frequently. c. add variety to the task. d. have a standard to compare against as an element of the operation. Feedback Your answer is correct. Which of the following elements is least necessary to a good corrective action feedback report? Select one: a. What caused the failure b. Who caused the failure c. What correction has been made d. Wh