Voordeelbundel
Federal Virtual Training Environment (FedVTE) Bundle Set
Federal Virtual Training Environment (FedVTE) Bundle Set
[Meer zien]Federal Virtual Training Environment (FedVTE) Bundle Set
[Meer zien]Which of the following families of controls belong to the technical class of controls? CORRECT ANSWER Identification and Authentication 
 
Which of the following is a management strategy for addressing risk? CORRECT ANSWER Accept 
 
Cyber risk management solutions are typically done through which ca...
Voorbeeld 2 van de 5 pagina's
In winkelwagenWhich of the following families of controls belong to the technical class of controls? CORRECT ANSWER Identification and Authentication 
 
Which of the following is a management strategy for addressing risk? CORRECT ANSWER Accept 
 
Cyber risk management solutions are typically done through which ca...
Which of the following alternative operating systems is focused mostly on greater security in the event of a compromise by preventing propagation? CORRECT ANSWER Qubes 
 
Which of the following might a malicious actor attempt to exploit in a social engineering attack? CORRECT ANSWER All of the above...
Voorbeeld 1 van de 3 pagina's
In winkelwagenWhich of the following alternative operating systems is focused mostly on greater security in the event of a compromise by preventing propagation? CORRECT ANSWER Qubes 
 
Which of the following might a malicious actor attempt to exploit in a social engineering attack? CORRECT ANSWER All of the above...
Which attribute constitutes the ability to identify and/or audit a user and his/her actions? CORRECT ANSWER Accountability 
 
Which security standards commonly supplements the use of an Internet Key Exchange (IKE)? CORRECT ANSWER IPSEC 
 
Which detail concerning risk analysis would you present to le...
Voorbeeld 1 van de 2 pagina's
In winkelwagenWhich attribute constitutes the ability to identify and/or audit a user and his/her actions? CORRECT ANSWER Accountability 
 
Which security standards commonly supplements the use of an Internet Key Exchange (IKE)? CORRECT ANSWER IPSEC 
 
Which detail concerning risk analysis would you present to le...
What are passive footprints? CORRECT ANSWER Data unintentionally left behind during typical internet activities 
 
If an investigator in New York state wants to document 2:15 PM on May 31, 2017, how would that moment in time be notated according the ISO 8601 directive? (New York is in the Eastern Ti...
Voorbeeld 1 van de 4 pagina's
In winkelwagenWhat are passive footprints? CORRECT ANSWER Data unintentionally left behind during typical internet activities 
 
If an investigator in New York state wants to document 2:15 PM on May 31, 2017, how would that moment in time be notated according the ISO 8601 directive? (New York is in the Eastern Ti...
Which of the following can be determined by capturing and analyzing network traffic? 
 
 
 
A. Intent of Insider Threat actors and logs of their activity 
 
B. Communication and connections between hosts 
 
C. Open files and Registry handles on individual hosts 
 
D. Firewall and Intrusion Detection...
Voorbeeld 2 van de 9 pagina's
In winkelwagenWhich of the following can be determined by capturing and analyzing network traffic? 
 
 
 
A. Intent of Insider Threat actors and logs of their activity 
 
B. Communication and connections between hosts 
 
C. Open files and Registry handles on individual hosts 
 
D. Firewall and Intrusion Detection...
The authorization decision document conveys the final security authorization decision from the authorizing official to the information system owner. The authorization decision document contains all of the following information except? 
A. Authorization decision 
 
 B. Terms and conditions for the ...
Voorbeeld 2 van de 12 pagina's
In winkelwagenThe authorization decision document conveys the final security authorization decision from the authorizing official to the information system owner. The authorization decision document contains all of the following information except? 
A. Authorization decision 
 
 B. Terms and conditions for the ...
An insurance plan is what type of mitigation strategy? CORRECT ANSWER Transfer Risk 
 
Which of the following is not a reason why a backdoor may exist? CORRECT ANSWER Attempts to interfere with the ability of a provider to keep services available 
 
What is the act of hiding messages in existing dat...
Voorbeeld 1 van de 2 pagina's
In winkelwagenAn insurance plan is what type of mitigation strategy? CORRECT ANSWER Transfer Risk 
 
Which of the following is not a reason why a backdoor may exist? CORRECT ANSWER Attempts to interfere with the ability of a provider to keep services available 
 
What is the act of hiding messages in existing dat...
In order to automate host characteristic monitoring you can compare baselines and snapshots with syslog. CORRECT ANSWER False 
 
The following should be taken into account when accepting the residual risk inherent in the project. CORRECT ANSWER All of the above 
 
What is the high water mark for an ...
Voorbeeld 1 van de 3 pagina's
In winkelwagenIn order to automate host characteristic monitoring you can compare baselines and snapshots with syslog. CORRECT ANSWER False 
 
The following should be taken into account when accepting the residual risk inherent in the project. CORRECT ANSWER All of the above 
 
What is the high water mark for an ...
A. White Hat 
 
B. Black Hat 
 
C. Red Hat 
 
D. Gray Hat CORRECT ANSWER D. Gray Hat 
 
During which step of Microsoft recommended Update Management Process would an update be tested? 
 
 
A. Assess 
 
B. Identify 
 
C. Evaluate and Plan 
 
D. Deploy CORRECT ANSWER C. Evaluate and Plan 
 
Which exec...
Voorbeeld 2 van de 12 pagina's
In winkelwagenA. White Hat 
 
B. Black Hat 
 
C. Red Hat 
 
D. Gray Hat CORRECT ANSWER D. Gray Hat 
 
During which step of Microsoft recommended Update Management Process would an update be tested? 
 
 
A. Assess 
 
B. Identify 
 
C. Evaluate and Plan 
 
D. Deploy CORRECT ANSWER C. Evaluate and Plan 
 
Which exec...
What program could you use on a Linux system to securely copy files to a Linux host running the SSH server daemon? CORRECT ANSWER SCP 
 
Single user mode in Linux is a security risk if a malicious actor has physical access to the host CORRECT ANSWER True 
 
srm is a tool used to securely delete file...
Voorbeeld 1 van de 4 pagina's
In winkelwagenWhat program could you use on a Linux system to securely copy files to a Linux host running the SSH server daemon? CORRECT ANSWER SCP 
 
Single user mode in Linux is a security risk if a malicious actor has physical access to the host CORRECT ANSWER True 
 
srm is a tool used to securely delete file...
A flaw in an online sporting goods website allows customers to purchase multiple quantities of goods and only be charged the single quantity price. To improve the site, management is demanding that the ecommerce application be tested to insure this flaw is corrected. Which of the following is the BE...
Voorbeeld 2 van de 9 pagina's
In winkelwagenA flaw in an online sporting goods website allows customers to purchase multiple quantities of goods and only be charged the single quantity price. To improve the site, management is demanding that the ecommerce application be tested to insure this flaw is corrected. Which of the following is the BE...
Topology Discovery - Answer Which of the following is a common environmental reconnaissance task that is performed to help gain insight on how an organization's networked systems are connected, or mapping the network? 
 
Not System or Security. Maybe Setup - Answer If an unexpected issue occu...
Voorbeeld 2 van de 8 pagina's
In winkelwagenTopology Discovery - Answer Which of the following is a common environmental reconnaissance task that is performed to help gain insight on how an organization's networked systems are connected, or mapping the network? 
 
Not System or Security. Maybe Setup - Answer If an unexpected issue occu...
1x verkocht
The acronym VPN stands for: - Answer Virtual Private Network 
 
Executives are responsible for managing and overseeing enterprise risk management. - Answer True 
 
The internal audit department is investigating a possible accounting breach. One of the auditors is sent to interview the following ...
Voorbeeld 2 van de 5 pagina's
In winkelwagenThe acronym VPN stands for: - Answer Virtual Private Network 
 
Executives are responsible for managing and overseeing enterprise risk management. - Answer True 
 
The internal audit department is investigating a possible accounting breach. One of the auditors is sent to interview the following ...
Which of the following should risk assessments be based upon as a best practice? 
 
A quantitative measurement of risk and impact and asset value 
An absolute measurement of threats 
A qualitative measurement of risk and impact 
A survey of annual loss and potential threats and asset value - Answer ...
Voorbeeld 3 van de 20 pagina's
In winkelwagenWhich of the following should risk assessments be based upon as a best practice? 
 
A quantitative measurement of risk and impact and asset value 
An absolute measurement of threats 
A qualitative measurement of risk and impact 
A survey of annual loss and potential threats and asset value - Answer ...
Which value in the PowerShell "execution policy" allows loading of all configuration files and scripts? - Answer Unrestricted 
 
Which Active Directory Certificate Service (AD CS) server role allows routers and other network devices that do not have a domain account to obtain certificates? - Ans...
Voorbeeld 2 van de 6 pagina's
In winkelwagenWhich value in the PowerShell "execution policy" allows loading of all configuration files and scripts? - Answer Unrestricted 
 
Which Active Directory Certificate Service (AD CS) server role allows routers and other network devices that do not have a domain account to obtain certificates? - Ans...
In Apple's mobile operating system, iOS, architecture, which layer helps in developing the visual appearance of an app? - Answer CoCoa 
 
Which of the following would be the best choice to use as a container for packing and transporting a mobile device that is collected for analysis? - Answer A...
Voorbeeld 1 van de 4 pagina's
In winkelwagenIn Apple's mobile operating system, iOS, architecture, which layer helps in developing the visual appearance of an app? - Answer CoCoa 
 
Which of the following would be the best choice to use as a container for packing and transporting a mobile device that is collected for analysis? - Answer A...
Ensuring that several individuals are able to perform a specific function in order to have oversight and eliminate single points of failure, is which of the following Operations Security principles? - Answer C. Rotation of duties 
 
A standard ACL: - Answer C. Identifies the source network to be...
Voorbeeld 1 van de 4 pagina's
In winkelwagenEnsuring that several individuals are able to perform a specific function in order to have oversight and eliminate single points of failure, is which of the following Operations Security principles? - Answer C. Rotation of duties 
 
A standard ACL: - Answer C. Identifies the source network to be...
Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!
Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.
Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!
Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.
Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.
Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper cracker. Stuvia faciliteert de betaling aan de verkoper.
Nee, je koopt alleen deze samenvatting voor $30.99. Je zit daarna nergens aan vast.
4,6 sterren op Google & Trustpilot (+1000 reviews)
Afgelopen 30 dagen zijn er 94314 samenvattingen verkocht
Opgericht in 2010, al 14 jaar dé plek om samenvattingen te kopen