Question

58. Question 58 Which three (3) of these are Solution Building Blocks (SBBs)? (Select 3) 1...

58.

Question 58

Which three (3) of these are Solution Building Blocks (SBBs)? (Select 3)

1 point

Virus Protection

Identity and Access Management

Spam Filter

Application Firewall

59.

Question 59

A robust cybersecurity defense includes contributions from 3 areas, human expertise, security analytics and artificial intelligence. Which of these areas would contain the ability for unstructured analysis?

1 point

Human expertise

Artificial intelligence

Security analytics

60.

Question 60

How would a SIEM flag a user who is trying to log in to the network from computers located in 2 different countries at the same time?

1 point

A vulnerability

An incident

An offense

A threat

61.

Question 61

Which of these is a good definition for cyber threat hunting?

1 point

The act of simulating attacks to identify vulnerabilities, testing new software to help protect the company's data, and helping users adhere to new regulations and processes to ensure the network stays safe.

The act of proactively and aggressively identifying, intercepting, tracking, investigating and eliminating cyber adversaries as early as possible in the cyber kill chain.

The act of creating and maintaining corporate security structures and ensuring that they function as designed. As high-level leaders, they also supervise security teams and have a hand in creating security-related policies and procedures.

The act of detecting, investigating, and responding to incidents, including planning and implementing preventative security measures building disaster recovery plans.

62.

Question 62

The cyber hunting team and the SOC analysts are informally referred to as the ____ and ____ teams, respectively.

1 point

Visitors, Home

Red, Blue

Blue. Red

Attack, Defense

63.

Question 63

Which three (3) soft skills are important to have in an organization's incident response team? (Select 3)

1 point

Problem solving and Critical thinking

Communication

Motivational

Teamwork

64.

Question 64

According to the IRIS Framework, during which stage of an attack would the attacker attempt to escalate their privileges, move laterally and conduct internal reconnaissance?

1 point

Attack beginnings.

Attack objective execution.

Continuous phases occur.

Continue the attack, expand network access.

Launch and execute the attack.

Homework Answers

Answer #1

ANSWERS :

ANS 58. a) Virus Protection

b) Identity and Access Management

d) Application Firewall

ANS 59. a) Human expertise

ANS 60. a) A vulnerability

ANS 61. b) The act of proactively and aggressively identifying, intercepting, tracking, investigating and eliminating cyber adversaries as early as possible in the cyber kill chain.

ANS 62. b) Red, Blue

ANS 63. a) Problem solving and Critical thinking

b) Communication

d) Teamwork

ANS 64. d) Continue the attack, expand network access.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Which application testing method tests applications from within using software instrumentation? 1 point SAST: Static Application...
Which application testing method tests applications from within using software instrumentation? 1 point SAST: Static Application Security Testing. IAST Interactive Application Security Testing. PAST: Passive Application Security Testing. DAST: Dynamic Security Application Testing. 57. Question 57 Which one of the OWASP Top 10 Application Security Risks would be occur when there are no safeguards against a user being allowed to execute HTML or JavaScript in the user's browser that can hijack sessions. 1 point Insufficient logging and monitoring Security misconfiguration...
5.Question 5 Pre-attack indicators are like post-attack indicators in which of the following ways: Both are...
5.Question 5 Pre-attack indicators are like post-attack indicators in which of the following ways: Both are more effective in the presence of external threat intelligence IP source shuns work about 50% of the time for both methods. Both will always prevent attacks Both are really a waste of time for most tools Neither can possibly prevent an attack. 1 point 6.Question 6 DMARC is a standard that enforces which of the following IT infrastructure bindings: Connects email content with checksums...
ANY ANSWER IS APPRECIATED Which of the following protocols are related to sending or receiving email?...
ANY ANSWER IS APPRECIATED Which of the following protocols are related to sending or receiving email? (Choose two) TFTP POP3 NNTP IRC SMTP 1 points    QUESTION 2 Which of the following best describes a data packet? A numbered designation of a particulat connection point or communication pathway Group of bytes to be sent between two devices on a network A set of rules used to communicate information A binary equivalent to a street address 1 points    QUESTION 3...
Question 61 ​The Electronic Communications Privacy Act (ECPA) of ____, which was enacted before most people...
Question 61 ​The Electronic Communications Privacy Act (ECPA) of ____, which was enacted before most people were using the Internet, does not include rules specifically designed to protect the privacy of persons using websites to conduct transactions. a. ​1996 b. ​1981 c. ​1986 d. ​1991 1 points Question 62 ​The ____ model is the process or processes that a company uses to find new customers, make sales, and deliver the goods or services it sells. a. ​subscription b. ​revenue c....
Please answer the following 10 multiply questions correctly on security operations. 1. Which of the following...
Please answer the following 10 multiply questions correctly on security operations. 1. Which of the following is a correct statement regarding digital forensics? It is the study of computer technology. It is a set of hardware-specific processes that must be followed in order for evidence to be admissible in a court of law. It encompasses network and code analysis, and may be referred to as electronic data discovery. Digital forensic responsibilities should be assigned to a network administrator before an...
48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63...
48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 QUESTION 1 All of the following are management’s objectives in designing effective internal controls over financial reporting (ICFR) except for ______________ ? a. Comply with section 404 of the Sarabanes Oxley (SOX) act. b. Producing accurate and complete financial statements and other reports to make operational decisions. c. Ensure reliability of financial reporting d. Management review of the year-end financial statements to ensure proper...
Question 1) Which of the following are considered valid criticisms of the legalistic model of crime...
Question 1) Which of the following are considered valid criticisms of the legalistic model of crime and criminology? a. Law in action departs substantially from the ideal behavior of the law. b. Focusing only on legally criminalized behavior makes it impossible to consider the impact of gender, race, age and ethnicity. c. Legalistic definitions ignore acts that cause great harm. d. The legalistic model suggests that these are absolute standards for judging right and wrong. e. All of the above....
Question 1 Which need in Maslow's hierarchy reflects a desire for love, friendship, affiliation, and group...
Question 1 Which need in Maslow's hierarchy reflects a desire for love, friendship, affiliation, and group acceptance? A.      Safety B.      Self-actualization C.      Belongingness D.      Esteem Question 2 If a person does not feel accepted or loved, they have not reached what level, according to Maslow ? A.      Level 1 B.      Level 5 C.      Level 3 D.      Level 2 Question 3 What stage of Maslow’s pyramid do you think could be skipped to move to another level ? A.      Psychological needs...
3. Should the CBC hire stars for their movies? To answer this question, run a hypothesis...
3. Should the CBC hire stars for their movies? To answer this question, run a hypothesis test to see if there is a significant difference between the ratings of movies with stars versus movies without stars. Use the data for CBC movies only. Use 95% confidence. Answer the following: a. What are the null and alternative hypotheses (state in full sentences)? b. Run the test using Excel and include the output table. Use a t-test assuming equal variances. c. What...
NWS620S Tutorial 1: Symmetric Encryption - DES Encryption is the translation of data into a secret...
NWS620S Tutorial 1: Symmetric Encryption - DES Encryption is the translation of data into a secret code so that only authorised entities can read it. Encrypting data is considered a very effective way of achieving data security. To access encrypted data, you must have access to a secret key that enables you to decrypt it. Unencrypted data is called plain text; encrypted data is referred to as cipher text. There are two types of encryption: • Symmetric encryption • Asymmetric...
ADVERTISEMENT
Need Online Homework Help?

Get Answers For Free
Most questions answered within 1 hours.

Ask a Question
ADVERTISEMENT