CYB 320 3-1

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

320

Subject

Information Systems

Date

Apr 3, 2024

Type

docx

Pages

3

Uploaded by BarristerExploration6300

Report
n 1 2 / 2 points The Verizon report titled “Data Breach Investigations Report” is published how often? Question options: Every 12 months Semi-annually Every month Quarterly on 2 / 2 poin Security incidents that result in a data breach typically have one factor in common. What is it? Question options: Log file entries on a web server are HTTP requests. Firewalls sit at the ingress and egress of networks. Data gets exfiltrated over a network. IDS systems have faulty log analysis. on 2 / 2 poin Using a whitelist approach to virtual patching is done by: Question options: Blocking “known bad” requests and permitting all other requests that do not fall into this category Blocking all requests except those that have a specific IP address Blocking all requests except those that match a defined pattern Blocking only HTML requests and permitting all other requests that do not fall into this category on 2 / 2 poin Which of the following is the first step in starting an IT asset management project?
Question options: Normalize all existing data Review the tools to be used Identify all data that is relevant Determine the scope on 2 / 2 poin Which of the following is not a commonly used antivirus software? Question options: SIEM Sophos AVG Symantec Endpoint Protection on 2 / 2 poin Which of the following is the golden rule of digital forensics? Question options: Know the scope of the project before you start. Estimate the cost before you start. Collect only data that is unencrypted. Go into every investigation as if you’ll have to defend your actions in a court of law. on 2 / 2 poin Any change to the working environment should be subject to which of the following before it is deployed? Question options: Commendations and praise
Stress tests Changes and modifications Review and scrutiny on 2 / 2 poin Changes made during an incident response should be: Question options: Withheld until the incident is contained Requested and planned before implementing Only recorded Reviewed, approved, and recorded on 2 / 2 poin When is it okay to reduce security? Question options: Only when the system is offline Only when it is approved by the administration Never Only when it is required to fix an existing problem on 2 / 2 poin Which of the following refers to proactively sifting through a given host or application for indicators of malicious activities? Question options: Incident response Threat hunting Carbon black Intrusion detection
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help