5.Question 5
Pre-attack indicators are like post-attack indicators in which of the following ways:
Both are more effective in the presence of external threat intelligence
IP source shuns work about 50% of the time for both methods.
Both will always prevent attacks
Both are really a waste of time for most tools
Neither can possibly prevent an attack.
1 point
6.Question 6
DMARC is a standard that enforces which of the following IT infrastructure bindings:
Connects email content with checksums
Connects source and destination ports
Connects email source with email server IP address
Connects email destinations with cryptographically checked ports
None of the above
1 point
7.Question 7
Fraud fits poorly into the CIA model for which of the following reasons:
Fraud fits into existing categories, but only after some adjustment
Integrity has many fraud attributes
Fraud is a unique scenario that does not easily fit into existing categories
Fraud and disclosure are mostly related
1 point
8.Question 8
Which of the following is an advantage of more reactive cyber defense (versus proactive defense)?
Less false positives
Less false negatives
Fewer vendor options
More vendor options
Fewer firewall rules at the perimeter gateway
1 point
9.Question 9
Brute force attacks are good for which of the following scenarios?
Lots of attack choices, but most will not work
Fewer attack choices, and most will work
Large attack domain size that can be enumerated and traversed with automation
Small number of attacks, where each is complex
None of the above
1 point
10.Question 10
Which of the following statements is not true?
Ciphertext-only is less secure than breaking encrypted text directly
Codebook is easier for bad guys to break than known plaintext
Known-plaintext hints cannot be controlled by the eavesdropper
Chosen-plaintext is more secure than codebook
None of these statements are true.
Q5: Pre-attack indicators are like post-attack indicators in which of the following ways:
Both are more effective in the presence of external threat intelligence
IP source shuns work about 50% of the time for both methods.
Both will always prevent attacks
Both are really a waste of time for most tools
Neither can possibly prevent an attack.
Answer:---------
Neither can possibly prevent an attack.
Q6: DMARC is a standard that enforces which of the following IT infrastructure bindings:
Connects email content with checksums
Connects source and destination ports
Connects email source with email server IP address
Connects email destinations with cryptographically checked ports
None of the above
Answer:------------
Connects email destinations with cryptographically checked ports
Q7: Fraud fits poorly into the CIA model for which of the following reasons:
Fraud fits into existing categories, but only after some adjustment
Integrity has many fraud attributes
Fraud is a unique scenario that does not easily fit into existing categories
Fraud and disclosure are mostly related
Answer:------------
Fraud fits into existing categories, but only after some adjustment
Q8: Which of the following is an advantage of more reactive cyber defense (versus proactive defense)?
Less false positives
Less false negatives
Fewer vendor options
More vendor options
Fewer firewall rules at the perimeter gateway
Answer:------------
More vendor options
Q9: Brute force attacks are good for which of the following scenarios?
Lots of attack choices, but most will not work
Fewer attack choices, and most will work
Large attack domain size that can be enumerated and traversed with automation
Small number of attacks, where each is complex
None of the above
Answer:------------
Lots of attack choices, but most will not work
Q10: Which of the following statements is not true?
Ciphertext-only is less secure than breaking encrypted text directly
Codebook is easier for bad guys to break than known plaintext
Known-plaintext hints cannot be controlled by the eavesdropper
Chosen-plaintext is more secure than codebook
None of these statements are true.
Answer:------------
Known-plaintext hints cannot be controlled by the eavesdropper
Get Answers For Free
Most questions answered within 1 hours.