Search Header Logo

BNS6 PT10

Authored by jaret valdez

Mathematics

University

BNS6 PT10
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

28 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security analyst needs to find real-time data on the latest malware and loCs. Which of the following would BEST describes the solution the analyst should pursue?

  1. Advisories and bulletins

  1. Threat feeds

  1. Security news articles

  1. Peer-reviewed content

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following would cause a Chief Information Security Officer (CISO) the MOST concern regarding newly installed Internet-accessible 4K surveillance cameras?

  1. An inability to monitor 100%, of every facility could expose the company to unnecessary risk.

  1. The cameras could be compromised if not patched in a timely manner.

Physical security at the facility may not protect the cameras from theft.

  1. Ransomwere is communicating with a command-and-control server.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A financial institution would like to stare is customer data a could but still allow the data ta he accessed and manipulated while encrypted. Doing se would prevent the cloud service provider from being able to decipher the data due to its sensitivity. The financial institution is not concern about computational overheads and slow speeds, Which of the following cryptographic techniques would BEST meet the requirement?

  1. Asymmatric

  1. Symmetric

  1. Homeomorphic

  1. Ephemeral

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A major political party experienced a server breach. The hacker then publicly posted stolen internal communications concerning campaign strategies to give the opposition party an advantage. Which of the following BEST describes these threat actors?

  1. Semi-authorized hackers

  1. State actors

  1. Script kiddies

  1. Advanced persistent threats

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following often operates in a client-server architecture to act as a service repository. providing enterprise consumers access to structured threat intelligence data?

  1. STIX

  1. CIRT

OSINT

  1. TAXII

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security analyst is reviewing the following output from a system:

TCP192.168.10.10:80 192.168.1.2:60101 TIME WAIT

TCP 192.168.10.10:80 192.168.1.2:60102 TIME WAIT

TCP 192.168.10.10:80 192.168.1.2:60103 TIME WAIT

TCP 192.168.10.10:80 192.168.1.2:60104 TIME WAIT

TCP 192.168.10.10:80 192.168.1.2:60105 TIME WAIT

TCP 192.168.10.10:80 192.168.1.2:60106 TIME WAIT

TCP 192.168.10.10:80 192.168.1.2:60107 TIME WAIT

TCP 192.168.10.10:80 192.168.1.2:60108 TIME WAIT

TCP 192.168.10.10:80 192.168.1.2:60109 TIME WAIT

TCP 192.168.10.10:80 192.168.1.2:60110 TIME WAIT

Which of the following is MOST likely being observed?

  1. ARP palsoning

  1. Man in the middle

  1. Denial of service

  1. DNS poisoning

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following would a European company interested in implementing a technical, hands-on set of security standards MOST likely choose?

  1. GOPR

  1. CIS controls

  1. ISO 27001

  1. ISO 37000

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?