Exam 12: Appendix: Managing the Security Process

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

CSIRTs rehearse an incident by talking about what should be done without actually doing it in ________.

Free
(Multiple Choice)
4.9/5
(44)
Correct Answer:
Verified

C

Companies should ________ single points of takeover.

Free
(Multiple Choice)
4.8/5
(35)
Correct Answer:
Verified

B

The goal of security is to eliminate risk.

Free
(True/False)
4.8/5
(36)
Correct Answer:
Verified

False

Allowing a user access to edit files in a specific directory is an example of ________.

(Multiple Choice)
4.8/5
(26)

An attacker must break through two firewalls to get to a host.This most specifically illustrates the ________ principle.

(Multiple Choice)
4.8/5
(31)

There should be relatively free access ________.

(Multiple Choice)
4.9/5
(32)

There is a single countermeasure in ________.

(Multiple Choice)
4.8/5
(39)

Which of the following is easiest to understand?

(Multiple Choice)
4.8/5
(41)

Oversight activities include ________.

(Multiple Choice)
4.9/5
(31)

CSIRT leaders should come from ________.

(Multiple Choice)
4.8/5
(39)

Live rehearsals are important because they ________ compared to desktop rehearsals.

(Multiple Choice)
4.8/5
(27)

________ are actions people can take on a resource.

(Multiple Choice)
5.0/5
(48)

Device IDSs typically send log files to the central IDS log file using the ________ protocol.

(Multiple Choice)
4.8/5
(39)

The Target attackers probably first broke into Target using the credentials of a(n)________.

(Multiple Choice)
4.8/5
(32)

Which department will almost always be involved in a CSIRT?

(Multiple Choice)
4.8/5
(36)

Servers in the Demilitarized Zone (DMZ)are rarely attacked by clients on the Internet.

(True/False)
4.8/5
(29)

To address uniformity of credentials verification throughout a large company,credentials verification information is usually stored in a single ________.

(Multiple Choice)
4.8/5
(38)

A building with some unlocked exterior doors most specifically violates the principle of ________.

(Multiple Choice)
4.9/5
(33)

The policy server creates ________.

(Multiple Choice)
4.9/5
(40)

Errors in assigning permission are reduced if assignments are based on ________.

(Multiple Choice)
5.0/5
(40)
Showing 1 - 20 of 69
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)