CYB 320 3-1
docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
320
Subject
Information Systems
Date
Apr 3, 2024
Type
docx
Pages
3
Uploaded by BarristerExploration6300
n 1
2 / 2 points
The Verizon report titled “Data Breach Investigations Report” is published how often?
Question options:
Every 12 months
Semi-annually
Every month
Quarterly
on 2 / 2
poin
Security incidents that result in a data breach typically have one factor in common. What is it?
Question options:
Log file entries on a web server are HTTP requests.
Firewalls sit at the ingress and egress of networks.
Data gets exfiltrated over a network.
IDS systems have faulty log analysis.
on 2 / 2
poin
Using a whitelist approach to virtual patching is done by:
Question options:
Blocking “known bad” requests and permitting all other requests that do not fall into this category
Blocking all requests except those that have a specific IP address
Blocking all requests except those that match a defined pattern
Blocking only HTML requests and permitting all other requests that do not fall into this category
on 2 / 2
poin
Which of the following is the first step in starting an IT asset management project?
Question options:
Normalize all existing data
Review the tools to be used
Identify all data that is relevant
Determine the scope
on 2 / 2
poin
Which of the following is
not
a commonly used antivirus software?
Question options:
SIEM
Sophos
AVG
Symantec Endpoint Protection
on 2 / 2
poin
Which of the following is the golden rule of digital forensics?
Question options:
Know the scope of the project before you start.
Estimate the cost before you start.
Collect only data that is unencrypted.
Go into every investigation as if you’ll have to defend your actions in a court of law.
on 2 / 2
poin
Any change to the working environment should be subject to which of the following before it is deployed?
Question options:
Commendations and praise
Stress tests
Changes and modifications
Review and scrutiny
on 2 / 2
poin
Changes made during an incident response should be:
Question options:
Withheld until the incident is contained
Requested and planned before implementing
Only recorded
Reviewed, approved, and recorded
on 2 / 2
poin
When is it okay to reduce security?
Question options:
Only when the system is offline
Only when it is approved by the administration
Never
Only when it is required to fix an existing problem
on 2 / 2
poin
Which of the following refers to proactively sifting through a given host or application for indicators of malicious activities?
Question options:
Incident response
Threat hunting
Carbon black
Intrusion detection
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help