Cyber treat Week4
docx
keyboard_arrow_up
School
Grand Rapids Community College *
*We aren’t endorsed by this school
Course
CYBER SECU
Subject
Information Systems
Date
Jan 9, 2024
Type
docx
Pages
10
Uploaded by ConstableWildcatMaster401
Congratulations! You passed!
Grade received 100%
Latest Submission Grade 100%
To pass 80% or higher
Go to next item
1.
Question 1
True or False. A security architect's job is to make sure that security considerations are balanced against other design aspects such as usability, resilience and cost.
1 / 1 point
True
FALSE
Correct
Correct!
2.
Question 2
Which of these is an aspect of an Enterprise Architecture?
1 / 1 point
Maps the main components of a problem space and solution at a very high level.
Gives the technology perspectives in detail
Describes how specific products or technologies are used
Shows the internal data and use of reusable or off-the-shelf components
Correct
Correct!
3.
Question 3
Which of these is an aspect of a Solution Architecture?
1 / 1 point
Does not describe the internals of the main components or how they will be implemented
Shows the internal data and use of reusable or off-the-shelf components
Considers the needs of the entire organization
Maps the main components of a problem space and solution at a very high level
Correct
Correct!
4.
Question 4
Which three (3) of these are features of Architecture Building Blocks (ABBs)? (Select 3)
1 / 1 point
Product and vendor neutral
Correct
Partially correct!
Specifies the technical components to implement a function
Guides the development of a Solution Architecture
Correct
Partially correct!
Captures and defines requirements such as function, data, and application
Correct
Partially correct!
5.
Question 5
Which three (3) of these are Architecture Building Blocks (ABBs)? (Select 3)
1 / 1 point
Identity and Access Management
Correct
Partially correct!
Key Security Manager
Infrastructure and Endpoint Security
Correct
Partially correct!
Detect and Respond
Correct
Partially correct!
6.
Question 6
Which three (3) of these are Solution Building Blocks (SBBs)? (Select 3)
1 / 1 point
Web Application Firewall (WAF)
Correct
Partially correct!
Privilege Access Manager
Correct
Partially correct!
Hardware Token
Correct
Partially correct!
Application Security
7.
Question 7
The diagram below shows which level of architecture?
1 / 1 point
High Level Security Architecture
Enterprise Security Architecture
Domain-specific Enterprise Security Architecture
Solution Architecture
Correct
Correct!
8.
Question 8
Solution architectures often contain diagrams like the one below. What does this diagram show?
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
1 / 1 point
Functional components and data flow
Enterprise architecture
Solution architecture overview
External context and boundry diagram
Correct
Correct!
9.
Question 9
Solution architectures often contain diagrams like the one below. What does this diagram show?
1 / 1 point
Functional components and data flow
Enterprise architecture
External context and boundary diagram
Architecture overview
Correct
Correct!
10.
Question 10
What is lacking in a security architecture pattern that prevents it from being used as a finished design?
1 / 1 point
The context of the project at hand
Proper level of abstraction
Vendor selections
Proper formatting
Correct
Correct!
11.
Question 11
What are the possible consequences if a bug in your application becomes known?
1 / 1 point
It is embarrassing to your company
Financial losses via lawsuits and fines can be very significant
Government agencies can impose fines and other sanctions against your company
All of the above
Correct
Correct!
12.
Question 12
What was the ultimate consequence to Target Stores in the United States from their 2013 data breach in which over 100M records were stolen?
1 / 1 point
Costs and fines estimated at $1B.
Costs and fines that forced the company into bankruptcy
Criminal negligence charges were filed 3 Target executives, 1 of whom received a prison sentence
Costs of $10M and reputational damage only.
Correct
Correct!
13.
Question 13
Select the two (2) top vulnerabilities found in common security products. (Select 2)
1 / 1 point
Use of hard-coded credentials
Cross-site request forgery
Correct
Partially correct!
Cross-site scripting
Correct
Partially correct!
SQL Injection
14.
Question 14
True or False. If you can isolate your product from the Internet, it is safe from being hacked.
1 / 1 point
True
False
Correct
Correct!
15.
Question 15
Which three (3) things can Cross-site scripting be used for? (Select 3)
1 / 1 point
Harvest credentials
Correct
Partially correct!
Take over sessions
Correct
Partially correct!
Steal cookies
Correct
Partially correct!
Break encryption
16.
Question 16
True or False. Commonly a Reflect XSS attack is sent as part of an Email or a malicious link and affects only the the user who receives the Email or link.
1 / 1 point
True
False
Correct
Correct!
17.
Question 17
Cross-site scripting attacks can be minimized by using HTML and URL Encoding. How would a browser display this string?: <b>Password</b>
1 / 1 point
<<Password>>
<b>Password</b>
Password
<b>Password</b>
Correct
Correct!
18.
Question 18
Which three (3) statements about whitelisting user input are true? (Select 3)
1 / 1 point
Single quotes should never be allowed as user input
Special characters should only be allowed on an exception basis
Correct
Partially correct!
Whenever possible, input should be whitelisted to alphanumeric values to prevent XSS
Correct
Partially correct!
Whitelisting reduces the attack surface to a known quantity
Correct
Partially correct!
19.
Question 19
Which two (2) statements are considered good practice for avoiding XSS attacks (Select 2)
1 / 1 point
Use strict whitelists on accepting input
Correct
Partially correct!
Develop you own validation or encoding functionality that is customized for your application
Encode all data output as part of HTML and JavaScript
Correct
Partially correct!
Use blacklists and client-side validation
20.
Question 20
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
How would you classify a hactivist group who thinks that your company's stance on climate change threatens the survival of the planet?
1 / 1 point
A threat
A vector
A risk
A vulnerability
Correct
Correct!
21.
Question 21
Which software development lifecycle is characterized by short bursts of analysis, design, coding and testing during a series of 1 to 4 week sprints?
1 / 1 point
Agile and Scrum
Iterative
Spiral
Waterfall
Correct
Correct!
22.
Question 22
Which software development lifecycle is characterized by a series of cycles and an emphasis on security?
1 / 1 point
Waterfall
Iterative
Spiral
Agile and Scrum
Correct
Correct!
23.
Question 23
Which form of penetration testing allows the testers no knowledge of the systems they are trying to penetrate in advance of their attack to simulate an external attack by hackers with no knowledge of an organizations systems?
1 / 1 point
Black Box Testing
Gray Box Testing
Red Box Testing
White Box testing
Correct
Correct!
24.
Question 24
Which application testing method requires a URL to the application, is quick and cheap but also produces the most false-positive results?
1 / 1 point
IAST Interactive Application Security Testing
PAST: Passive Application Security Testing
SAST: Static Application Security Testing
DAST: Dynamic Security Application Testing
Correct
Correct!
25.
Question 25
Which type of application attack would include buffer overflow, cross-site scripting, and SQL injection?
1 / 1 point
Authentication
Authorization
Input validation
Configuration management
Correct
Correct!
26.
Question 26
Which type of application attack would include unauthorized access to configuration stores, unauthorized access to administration interfaces and over-privileged process and service accounts?
1 / 1 point
Auditing and logging
Authentication
Exception management
Configuration management
Correct
Correct!
27.
Question 27
Which one of the OWASP Top 10 Application Security Risks would occur when authentication and session management functions are implemented incorrectly allowing attackers to compromise passwords, keys or session tokens.
1 / 1 point
Broken access control
Broken authentication
XML external entities (XXE)
Sensitive data exposure
Correct
Correct!
28.
Question 28
Which one of the OWASP Top 10 Application Security Risks would occur when restrictions on what a user is allowed to do is not properly enforced?
1 / 1 point
Insecure deserialization
Broken access control
Cross-site scripting
Security misconfiguration
Correct
Correct!
29.
Question 29
Which of these threat modeling methodologies is integrated seamlessly into an Agile development methodology?
1 / 1 point
P.A.S.T.A.
TRIKE
VAST
STRIDE
Correct
Correct!
30.
Question 30
Security standards do not have the force of law but security regulations do. Which one of these is a security regulation?
1 / 1 point
NIST 800-53
ISO 27034/24772
PCI-DSS
HIPAA
Correct
Correct!
31.
Question 31
Which phase of DevSecOps would contain the activities Secure application code, Secure infrastructure configuration, and OSS/COTS validation?
1 / 1 point
Release, deploy & decommission
Code & build
Plan
Test
Operate & monitor
Correct
Correct!
32.
Question 32
Which phase of DevSecOps would contain the activities Detect & Visualize, Respond, and Recover?
1 / 1 point
Operate & monitor
Plan
Test
Release, deploy & decommission
Code & build
Correct
Correct!
33.
Question 33
The Deploy step in the DevSecOps Release, Deploy & Decommission phase contains which of these activities?
1 / 1 point
IAM controles to regulate authorization
Data backup cleansing
Versioning of infrastructure
Creation of Immutable images
Correct
Correct!
34.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Question 34
The Respond step in the DevSecOps Operate & Monitor phase contains which of these activities?
1 / 1 point
Inventory
Chaos engineering
Virtual Patching
Root Cause Analysis
Correct
Correct!