Exam 7: Reacting to a Cyber Incident: Impact and Forensics
Exam 1: Applying Environmental Reconnaissance9 Questions
Exam 2: Analyzing Network Reconnaissance10 Questions
Exam 3: Strengthening the Network10 Questions
Exam 4: Exploring Penetration Testing10 Questions
Exam 5: Scanning for Vulnerabilities10 Questions
Exam 6: Analyzing Vulnerability Scans and Identifying Common Vulnerabilities10 Questions
Exam 7: Reacting to a Cyber Incident: Impact and Forensics10 Questions
Exam 8: Reacting to a Cyber Incident: Communication and Incident Recovery10 Questions
Exam 9: Reacting to a Cyber Incident: Analyzing Common Symptoms10 Questions
Exam 10: Security Structures and Identity and Access Management10 Questions
Exam 11: Defense in Depth, Software Development, and Data Analytics10 Questions
Select questions type
A ____________ is a more targeted version of a brute force attack that uses placeholders for characters in certain positions of the password; its goal is to speed up the cracking process by reducing the number of potential candidates that must be created.
Free
(Short Answer)
4.8/5
(29)
Correct Answer:
Mask attack
What is the term for the amount of time an incident interrupts normal business processes?
Free
(Short Answer)
4.9/5
(38)
Correct Answer:
Downtime
Which phase of a cyber incident response plan has the goal of permitting affected systems back into the production environment?
Free
(Multiple Choice)
4.9/5
(34)
Correct Answer:
B
Which of the following forms in a forensics kit helps to document that evidence was under strict control at all times?
(Multiple Choice)
4.8/5
(38)
Which is the following is not considered an element of a forensics kit?
(Multiple Choice)
4.9/5
(36)
The primary tool in a forensics kit is a _______________, which is specially configured to perform forensics activities.
(Short Answer)
4.9/5
(29)
What type of attack conducts a statistical analysis on passwords and then uses it to create a mask in an attempt to break the largest number of possible passwords.
(Multiple Choice)
4.8/5
(38)
A person's name, Social Security number, driver's license number, bank account number, and passport number are examples of ______________.
(Short Answer)
4.7/5
(31)
Which U.S. Cabinet Secretary introduced many Americans to the concepts of known knowns and known unknowns?
(Multiple Choice)
4.8/5
(35)
The majority of U.S. organizations are considered "cyber-ready" to defend themselves against attacks.
(True/False)
4.9/5
(39)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)