CYB 410 1-2 Reading Quiz
docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
410
Subject
Information Systems
Date
Apr 3, 2024
Type
docx
Pages
4
Uploaded by BarristerExploration6300
Attempt Score
20 / 20 - A
Overall Grade (Highest Attempt)
20 / 20 - A
stion 1
2 / 2 point
Drivers behind breach attempts typically fall into which of the following three goals?
Question options:
Theft of equipment, theft of supplies, denial of service
Hacktivism, state sponsored, human error
Insider threat, external threat, deception
Theft of funds, theft of information, or cause disruption
on 2 / 2
poin
What can be observed by the intensity or persistence, the use of stealth, and the time dedicated to planning or executing an attack?
Question options:
Knowledge
Commitment
Reasoning
Actions
on 2 / 2
poin
Which adversary type can violate laws and take atypical approaches in the course of investigating or attempting to improve security?
Question options:
Black hats
Red hats
Grey hats
White hats
on 2 / 2
poin
Which of the following is intended to apply potential threat scenarios to an organization’s environment?
Question options:
Penetration testing
Red teaming
Vulnerability assessment
Threat modeling
on 2 / 2
poin
What is the potential path an adversary may take against a system?
Question options:
Attack vector
Attack decision
Attack type
Attack location
on 2 / 2
poin
What has proven to be highly effective in separating large amounts of money from otherwise successful and well-
managed organizations by leveraging a range of human vulnerabilities?
Question options:
Threat modeling
Risk mitigation
Business email compromise
Grey hats
on 2 / 2
poin
Who reviews and comments in the tabletop portion of the scenario analysis exercise?
Question options:
Threat actors
Law enforcement
Invited participants
Management
on 2 / 2
poin
Which of the following is considered a type of tabletop exercise because it typically does not involve tests of exploits against systems?
Question options:
Penetration testing
Red teaming
Scenario analysis
Lessons learned
on 2 / 2
poin
Which of the following steps of the Cyber Kill Chain by Lockheed Martin involves malware communicating with the adversary’s systems?
Question options:
Command and control
Installation
Delivery
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Weaponization
on 2 / 2
poin
Which of the following determines the nature and degree of system vulnerabilities and can take a variety of forms based on factors such as the balance of technological and non-
technological concerns?
Question options:
Penetration testing
Risk acceptance
Threat intelligence
Vulnerability assessment