CYB 410 1-2 Reading Quiz

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

410

Subject

Information Systems

Date

Apr 3, 2024

Type

docx

Pages

4

Uploaded by BarristerExploration6300

Report
Attempt Score 20 / 20 - A Overall Grade (Highest Attempt) 20 / 20 - A stion 1 2 / 2 point Drivers behind breach attempts typically fall into which of the following three goals? Question options: Theft of equipment, theft of supplies, denial of service Hacktivism, state sponsored, human error Insider threat, external threat, deception Theft of funds, theft of information, or cause disruption on 2 / 2 poin What can be observed by the intensity or persistence, the use of stealth, and the time dedicated to planning or executing an attack? Question options: Knowledge Commitment Reasoning Actions on 2 / 2 poin Which adversary type can violate laws and take atypical approaches in the course of investigating or attempting to improve security? Question options: Black hats Red hats Grey hats
White hats on 2 / 2 poin Which of the following is intended to apply potential threat scenarios to an organization’s environment? Question options: Penetration testing Red teaming Vulnerability assessment Threat modeling on 2 / 2 poin What is the potential path an adversary may take against a system? Question options: Attack vector Attack decision Attack type Attack location on 2 / 2 poin What has proven to be highly effective in separating large amounts of money from otherwise successful and well- managed organizations by leveraging a range of human vulnerabilities? Question options: Threat modeling Risk mitigation Business email compromise
Grey hats on 2 / 2 poin Who reviews and comments in the tabletop portion of the scenario analysis exercise? Question options: Threat actors Law enforcement Invited participants Management on 2 / 2 poin Which of the following is considered a type of tabletop exercise because it typically does not involve tests of exploits against systems? Question options: Penetration testing Red teaming Scenario analysis Lessons learned on 2 / 2 poin Which of the following steps of the Cyber Kill Chain by Lockheed Martin involves malware communicating with the adversary’s systems? Question options: Command and control Installation Delivery
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Weaponization on 2 / 2 poin Which of the following determines the nature and degree of system vulnerabilities and can take a variety of forms based on factors such as the balance of technological and non- technological concerns? Question options: Penetration testing Risk acceptance Threat intelligence Vulnerability assessment