A threat source does not present a risk if NO vulnerability that can be exercised for a particular threat source.
A threat source does not present a risk if NO vulnerability that can be exercised for a particular threat source. Identify the step in which different threat sources are defined: A . Identification VulnerabilitiesB . Control analysisC . Threat identificationD . System characterizationView AnswerAnswer: C
Which of the following steps focus on limiting the scope and extent of an incident?
Incident handling and response steps help you to detect, identify, respond and manage an incident. Which of the following steps focus on limiting the scope and extent of an incident?A . EradicationB . ContainmentC . IdentificationD . Data collectionView AnswerAnswer: B
Identify the Sarbanes-Oxley Act (SOX) Title, which consists of only one section, that includes measures designed to help restore investor confidence in the reporting of securities analysts.
Identify the Sarbanes-Oxley Act (SOX) Title, which consists of only one section, that includes measures designed to help restore investor confidence in the reporting of securities analysts.A . Title VI: Stud is and ReportsB . Title IX: White-Collar-Crime Penalty EnhancementC . Title V: Analyst Conflicts of InterestD . Title VIII:...
Which of the following is not a countermeasure to eradicate inappropriate usage incidents?
Which of the following is not a countermeasure to eradicate inappropriate usage incidents?A . Registering user activity logs and keep monitoring them regularlyB . Avoiding VPN and other secure network channelsC . Always storing the sensitive data in far located servers and restricting its accessD . Installing firewall and IDS/IPS...
Alice is a disgruntled employee. She decided to acquire critical information from her organization for financial benefit. To accomplish this, Alice started running a virtual machine on the same physical host as her victim's virtual machine and took advantage of shared physical resources(processor cache) to steal data (cryptographic key/plaintext secrets) from the victim machine.
Alice is a disgruntled employee. She decided to acquire critical information from her organization for financial benefit. To accomplish this, Alice started running a virtual machine on the same physical host as her victim's virtual machine and took advantage of shared physical resources(processor cache) to steal data (cryptographic key/plaintext secrets)...
Identify a standard national process which establishes a set of activities, general tasks and a management structure to certify and accredit systems that will maintain the information assurance (IA) and security posture of a system or site.
Identify a standard national process which establishes a set of activities, general tasks and a management structure to certify and accredit systems that will maintain the information assurance (IA) and security posture of a system or site.A . NIASAPB . NIAAAPC . NIPACPD . NIACAPView AnswerAnswer: D
Quantitative risk is the numerical determination of the probability of an adverse event and the extent of the losses due to the event. Quantitative risk is calculated as:
Quantitative risk is the numerical determination of the probability of an adverse event and the extent of the losses due to the event. Quantitative risk is calculated as:A . (Probability of Loss) X (Loss)B . (Loss) / (Probability of Loss)C . (Probability of Loss) / (Loss)D . Significant Risks X...
Which of the following methods help incident responders to reduce the false-positive alert rates and further provide benefits of focusing on top priority issues, thereby reducing potential risk and corporate liabilities?
Which of the following methods help incident responders to reduce the false-positive alert rates and further provide benefits of focusing on top priority issues, thereby reducing potential risk and corporate liabilities?A . Threat attributionB . Threat correlationC . Threat contextualizationD . Threat profilingView AnswerAnswer: D
Michael is an incident handler at CyberTech Solutions. He is performing detection and analysis of a cloud
Michael is an incident handler at CyberTech Solutions. He is performing detection and analysis of a cloud security incident. He is also analyzing the filesystems, slack spaces, and metadata within the storage units to find hidden malware and evidence of malice. Identify the cloud security incident handled by Michael:A ....
Which stage of the incident response and handling process involves auditing the system and network logfiles?
Which stage of the incident response and handling process involves auditing the system and network logfiles?A . Incident triageB . Incident eradicationC . ContainmentD . Incident disclosureView AnswerAnswer: D