Exam 7: Reacting to a Cyber Incident: Impact and Forensics

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

A ____________ is a more targeted version of a brute force attack that uses placeholders for characters in certain positions of the password; its goal is to speed up the cracking process by reducing the number of potential candidates that must be created.

Free
(Short Answer)
4.8/5
(29)
Correct Answer:
Verified

Mask attack

What is the term for the amount of time an incident interrupts normal business processes?

Free
(Short Answer)
4.9/5
(38)
Correct Answer:
Verified

Downtime

Which phase of a cyber incident response plan has the goal of permitting affected systems back into the production environment?

Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
Verified

B

Which of the following forms in a forensics kit helps to document that evidence was under strict control at all times?

(Multiple Choice)
4.8/5
(38)

Which is the following is not considered an element of a forensics kit?

(Multiple Choice)
4.9/5
(36)

The primary tool in a forensics kit is a _______________, which is specially configured to perform forensics activities.

(Short Answer)
4.9/5
(29)

What type of attack conducts a statistical analysis on passwords and then uses it to create a mask in an attempt to break the largest number of possible passwords.

(Multiple Choice)
4.8/5
(38)

A person's name, Social Security number, driver's license number, bank account number, and passport number are examples of ______________.

(Short Answer)
4.7/5
(31)

Which U.S. Cabinet Secretary introduced many Americans to the concepts of known knowns and known unknowns?

(Multiple Choice)
4.8/5
(35)

The majority of U.S. organizations are considered "cyber-ready" to defend themselves against attacks.

(True/False)
4.9/5
(39)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)