Exam 16: Cybersecurity

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

RAM Manufacturing LLC is a rapidly growing manufacturer of parts for the automotive industry. Maeve is an IT auditor at RAM Manufacturing, working on a project for the Cybersecurity department. Maeve has prioritized the following cyberattack categories: • Denial-of-service attacks • Viruses • Worms • Logic bombs • Trojan horses Match the following attack description to one of these cyberattack categories. -Many RAM Manufacturing employees received an email from prompting them to install a new expense reporting system. Employees who downloaded the software experienced no disruption and the attack did not replicate itself.

(Multiple Choice)
4.7/5
(51)

What is accidental tailgating?

(Multiple Choice)
4.7/5
(39)

The National Institute of Standards and Technology (NIST) has published Security and Privacy Controls for Federal Information Systems and Organizations (NIST-800-53). The NIST-800-53 document is divided into

(Multiple Choice)
4.9/5
(32)

What step do reconnaissance attacks correspond to in the cyber-kill chain?

(Multiple Choice)
4.7/5
(34)

A business can protect itself from DoS and DDoS attacks by ensuring that firewalls, ________, and intrusion detection systems are up-to-date, are properly configured, and will automatically block the ports where fake requests enter the system.

(Multiple Choice)
4.7/5
(40)

RAM Manufacturing LLC is a rapidly growing manufacturer of parts for the automotive industry. Maeve is an IT auditor at RAM Manufacturing, working on a project for the Cybersecurity department. Maeve has prioritized the following cyberattack categories: • Denial-of-service attacks • Viruses • Worms • Logic bombs • Trojan horses Match the following attack description to one of these cyberattack categories. -An employee was granted a large increase in memory on his laptop and then requested an additional increase one week later. Upon investigation, highly replicative malicious code was found on is computer.

(Multiple Choice)
4.9/5
(32)

Which of the following reflects the correct sequence of the three steps of the cyber-kill chain?

(Multiple Choice)
4.8/5
(32)

What is a Malware attack?

(Multiple Choice)
4.8/5
(34)

The National Institute of Standards and Technology (NIST) has published Security and Privacy Controls for Federal Information Systems and Organizations (NIST-800-53). The NIST-800-53 document is

(Multiple Choice)
4.9/5
(26)

At larger companies, the cybersecurity program is usually the responsibility of a dedicated executive leader. This could include the

(Multiple Choice)
4.8/5
(38)

Match the cybersecurity threat to the following control activity: -Review and update the baseline configuration of the information system using a company-defined frequency.

(Multiple Choice)
4.9/5
(35)

The National Institute of Standards and Technology (NIST) has published Security and Privacy Controls for Federal Information Systems and Organizations (NIST-800-53). One of the control families is Awareness and Training. What ID does Awareness and Training family use?

(Multiple Choice)
4.7/5
(46)

The National Institute of Standards and Technology (NIST) has published Security and Privacy Controls for Federal Information Systems and Organizations (NIST-800-53). The NIST-800-53 document is divided into 18 control families. One of the control families is Security Assessment and Authorization. What ID does Security Assessment and Authorization family use?

(Multiple Choice)
4.8/5
(30)

What is a surveys red flag?

(Multiple Choice)
4.9/5
(36)

RAM Manufacturing LLC is a rapidly growing manufacturer of parts for the automotive industry. Maeve is an IT auditor at RAM Manufacturing, working on a project for the Cybersecurity department. Maeve has prioritized the following cyberattack categories: • Denial-of-service attacks • Viruses • Worms • Logic bombs • Trojan horses Match the following attack description to one of these cyberattack categories. -Mobile app orders experienced an unprecedented increase at an unusual time of day that resulted in the order system crashing.

(Multiple Choice)
4.8/5
(35)

Physical access attacks

(Multiple Choice)
4.8/5
(34)

A company's best defense against phishing attacks is to train employees to recognize and report red flags. The correct definition of a poor grammar or spelling red flag is

(Multiple Choice)
4.8/5
(33)

Florida Water Supply, a water treatment facility, is an example of being hacked to

(Multiple Choice)
4.7/5
(32)

Which of the following logical access attacks is a brute-force attack?

(Multiple Choice)
4.9/5
(49)

The National Institute of Standards and Technology (NIST) has published Security and Privacy Controls for Federal Information Systems and Organizations (NIST-800-53). The NIST-800-53 document is divided into 18 control families. One of the control families is Personal Security. What ID does Personal Security family use?

(Multiple Choice)
4.9/5
(46)
Showing 21 - 40 of 99
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)