Question

58. Question 58 Which three (3) of these are Solution Building Blocks (SBBs)? (Select 3) 1...

58.

Question 58

Which three (3) of these are Solution Building Blocks (SBBs)? (Select 3)

1 point

Virus Protection

Identity and Access Management

Spam Filter

Application Firewall

59.

Question 59

A robust cybersecurity defense includes contributions from 3 areas, human expertise, security analytics and artificial intelligence. Which of these areas would contain the ability for unstructured analysis?

1 point

Human expertise

Artificial intelligence

Security analytics

60.

Question 60

How would a SIEM flag a user who is trying to log in to the network from computers located in 2 different countries at the same time?

1 point

A vulnerability

An incident

An offense

A threat

61.

Question 61

Which of these is a good definition for cyber threat hunting?

1 point

The act of simulating attacks to identify vulnerabilities, testing new software to help protect the company's data, and helping users adhere to new regulations and processes to ensure the network stays safe.

The act of proactively and aggressively identifying, intercepting, tracking, investigating and eliminating cyber adversaries as early as possible in the cyber kill chain.

The act of creating and maintaining corporate security structures and ensuring that they function as designed. As high-level leaders, they also supervise security teams and have a hand in creating security-related policies and procedures.

The act of detecting, investigating, and responding to incidents, including planning and implementing preventative security measures building disaster recovery plans.

62.

Question 62

The cyber hunting team and the SOC analysts are informally referred to as the ____ and ____ teams, respectively.

1 point

Visitors, Home

Red, Blue

Blue. Red

Attack, Defense

63.

Question 63

Which three (3) soft skills are important to have in an organization's incident response team? (Select 3)

1 point

Problem solving and Critical thinking

Communication

Motivational

Teamwork

64.

Question 64

According to the IRIS Framework, during which stage of an attack would the attacker attempt to escalate their privileges, move laterally and conduct internal reconnaissance?

1 point

Attack beginnings.

Attack objective execution.

Continuous phases occur.

Continue the attack, expand network access.

Launch and execute the attack.

Homework Answers

Answer #1

ANSWERS :

ANS 58. a) Virus Protection

b) Identity and Access Management

d) Application Firewall

ANS 59. a) Human expertise

ANS 60. a) A vulnerability

ANS 61. b) The act of proactively and aggressively identifying, intercepting, tracking, investigating and eliminating cyber adversaries as early as possible in the cyber kill chain.

ANS 62. b) Red, Blue

ANS 63. a) Problem solving and Critical thinking

b) Communication

d) Teamwork

ANS 64. d) Continue the attack, expand network access.

Know the answer?
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for?
Ask your own homework help question
Similar Questions
Which application testing method tests applications from within using software instrumentation? 1 point SAST: Static Application...
Which application testing method tests applications from within using software instrumentation? 1 point SAST: Static Application Security Testing. IAST Interactive Application Security Testing. PAST: Passive Application Security Testing. DAST: Dynamic Security Application Testing. 57. Question 57 Which one of the OWASP Top 10 Application Security Risks would be occur when there are no safeguards against a user being allowed to execute HTML or JavaScript in the user's browser that can hijack sessions. 1 point Insufficient logging and monitoring Security misconfiguration...
5.Question 5 Pre-attack indicators are like post-attack indicators in which of the following ways: Both are...
5.Question 5 Pre-attack indicators are like post-attack indicators in which of the following ways: Both are more effective in the presence of external threat intelligence IP source shuns work about 50% of the time for both methods. Both will always prevent attacks Both are really a waste of time for most tools Neither can possibly prevent an attack. 1 point 6.Question 6 DMARC is a standard that enforces which of the following IT infrastructure bindings: Connects email content with checksums...
Question 61 ​The Electronic Communications Privacy Act (ECPA) of ____, which was enacted before most people...
Question 61 ​The Electronic Communications Privacy Act (ECPA) of ____, which was enacted before most people were using the Internet, does not include rules specifically designed to protect the privacy of persons using websites to conduct transactions. a. ​1996 b. ​1981 c. ​1986 d. ​1991 1 points Question 62 ​The ____ model is the process or processes that a company uses to find new customers, make sales, and deliver the goods or services it sells. a. ​subscription b. ​revenue c....
48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63...
48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 QUESTION 1 All of the following are management’s objectives in designing effective internal controls over financial reporting (ICFR) except for ______________ ? a. Comply with section 404 of the Sarabanes Oxley (SOX) act. b. Producing accurate and complete financial statements and other reports to make operational decisions. c. Ensure reliability of financial reporting d. Management review of the year-end financial statements to ensure proper...
Question 1) Which of the following are considered valid criticisms of the legalistic model of crime...
Question 1) Which of the following are considered valid criticisms of the legalistic model of crime and criminology? a. Law in action departs substantially from the ideal behavior of the law. b. Focusing only on legally criminalized behavior makes it impossible to consider the impact of gender, race, age and ethnicity. c. Legalistic definitions ignore acts that cause great harm. d. The legalistic model suggests that these are absolute standards for judging right and wrong. e. All of the above....
Question 1 Which need in Maslow's hierarchy reflects a desire for love, friendship, affiliation, and group...
Question 1 Which need in Maslow's hierarchy reflects a desire for love, friendship, affiliation, and group acceptance? A.      Safety B.      Self-actualization C.      Belongingness D.      Esteem Question 2 If a person does not feel accepted or loved, they have not reached what level, according to Maslow ? A.      Level 1 B.      Level 5 C.      Level 3 D.      Level 2 Question 3 What stage of Maslow’s pyramid do you think could be skipped to move to another level ? A.      Psychological needs...
3. Should the CBC hire stars for their movies? To answer this question, run a hypothesis...
3. Should the CBC hire stars for their movies? To answer this question, run a hypothesis test to see if there is a significant difference between the ratings of movies with stars versus movies without stars. Use the data for CBC movies only. Use 95% confidence. Answer the following: a. What are the null and alternative hypotheses (state in full sentences)? b. Run the test using Excel and include the output table. Use a t-test assuming equal variances. c. What...
NWS620S Tutorial 1: Symmetric Encryption - DES Encryption is the translation of data into a secret...
NWS620S Tutorial 1: Symmetric Encryption - DES Encryption is the translation of data into a secret code so that only authorised entities can read it. Encrypting data is considered a very effective way of achieving data security. To access encrypted data, you must have access to a secret key that enables you to decrypt it. Unencrypted data is called plain text; encrypted data is referred to as cipher text. There are two types of encryption: • Symmetric encryption • Asymmetric...
Circle the letter that corresponds to the best answer for each question. 1.     Which of the...
Circle the letter that corresponds to the best answer for each question. 1.     Which of the following statements concerning the nursing process is accurate? a.     The nursing process is nurse oriented. b.    The steps of the nursing process are separate entities. c.     The nursing process is nursing practice in action. d.    The nursing process comprises four steps to promote patient well-being. 2.     Which of the following groups legitimized the steps of the nursing process in 1973 by devel- oping standards...
1. What is an ISP (Integrated Service Provider) for supply chains? (1 point) A. A consultant...
1. What is an ISP (Integrated Service Provider) for supply chains? (1 point) A. A consultant agency which integrates the supply chain for companies B. A 2 PL or a 3PL, but not a 4PL C. A company supplying transportation and warehousing services D. A logistics service company specialized in suppling VAS (value added services) 2. What characterizes a 4 PL? (1 point) A. They are non-asset based and provides integrated services primarily supplied by asset based providers, for example...