Usb block 1.6.2 crack7/12/2023 ![]() Which of the following has the greatest estimated impact?Ī) An attack with a $100 loss that could happen once a week.ī) An attack with a $400 loss that could happen once a monthĬ) An attack with a $2000 loss that could happen twice a yearĭ) An attack with a $5000 loss that could happen once a year a) An attack with a $100 loss that could happen once a week. True or False? Hacktivists are threat agents who are usually a loosely organized source of widespread attacks.įalse True Anonymous is an example of what kind of agent?Ĭ) Intelligence a) Threat Which of the following yields a more specific set of attacks tied to our particular threat agents?Ī) Threat matrix d) Attack matrix Which of the following produces a risk to an asset?Ĭ) A vulnerability and an attack that implements that vulnerabilityĪ) A threat agent and an attack the agent can performī) A threat and a vulnerability a) A threat agent and an attack the agent can perform Which of the following are threat agents?Ĭ) Phone phreak True or False? Modus operandi applies only to criminal organizations.įalse False Which of the following types of threat agents is most typically associated with masquerade attacks?Ī) Property thieves c) Identity thieves Which threat agent is most often associated with denial of service attacks?Ī) Identity thieves c) Natural threats Impact x Likelihood = _ Relative Significance of Risk Typical retail businesses expect a _ rate of loss due to theft, damages, and other causes.Ī) 15 percent d) 3 percent True or False? Once we have filled in the attack likelihoods and impacts, we compute the significance by multiplying these values together.įalse True We are estimating the impact of an individual attack. ![]() b) take actions to mitigate a serious risk. ![]() The analyst should not:ĭ) securely erase all collected information that's not needed for business purposes.Ī) get written authorization from the organization to verify that the assessment should take place.ī) take actions to mitigate a serious risk.Ĭ) protect all working notes. ![]() Which basic security principle does this illustrate?Ĭ) Defense in depth b) Least privilege Which of the following would be considered insider threats?Į) Maintenance crew True or False? Information security architecture often relies on boundaries outside the computer to protect important information or programs from error-prone or malicious programs.įalse False A security analyst is performing a security assessment. Only specific employees are allowed to read it. The resulting assessment is treated as confidential and is not shared with Alice's coworkers. threat agent Alice has performed a security assessment for Acme Widget. When analyzing the boundary, is the window considered a wall or a doorway?Ī) Wall b) Doorway A _ is someone who is motivated to attack our assets. The window is generally left locked, but it may be opened. When analyzing the apartment's boundary, is the window considered a wall or a doorway?ī) Doorway a) Wall An apartment has a large window that is provided in part as an emergency exit in case of a fire. An apartment has a large window, which is covered with metal bars to prevent people from going through the window. Which of the following is a person who has learned specific attacks on computer systems and can use those specific attacks?ĭ) Hacker a) Cracker Which of the following are the CIA properties?Ĭ) Integrity True or False? A vulnerability is a security measure intended to protect an asset.įalse False An attempt by a threat agent to exploit assets without permission is referred to as:ī) a vulnerability. cybersecurity True or False? Security Category RMF begins with a high-level estimate of the impact caused by cyber security failures.įalse True True or False? A vulnerability is a weakness in the boundary that protects the assets from the threat agents.įalse True True or False? A threat agent is a person who did attack our assets, while an attacker might attack an asset.įalse False CIA properties do not include:ĭ) availability. Which of the following is an example of a rule-based security decision?ī) Performing a step-by-step security analysisĭ) Trying to outdo a neighbor's security measures a) Locking a car's ignition Which of the following is an example of security theater?ĭ) Choosing a defense based on a systematic, step-by-step processĬ) Trying to outrun a hungry bear b) Installing a fake video camera True or False? The term "security theater" refers to security measures intended to make potential victims feel safe and secure without regard to their effectiveness.įalse True Risk Management Framework is a way to assess _ risks when developing large-scale computer systems.
0 Comments
Leave a Reply. |