Question

Multiple Choice 1. Which statement applies to a lowimpact exposure incident? A. A low-impact expo...

Multiple Choice

1. Which statement applies to a lowimpact exposure incident?

A. A low-impact exposure incident only involves repairing the broken system.

B. A low-impact exposure incident may result in significant risk exposure.

C. A low-impact exposure incident require the highest level of scrutiny.

D. A low-impact exposure incident can essentially be ignored.

2. What are the two components comprising information criticality?

A. Data location and data classification

B. Quantity of data involved and data location

C. Data classification and the quantity of data involved

D. Impact on the core business process and its location

3. Which term refers to a key measure used to prioritize actions throughout the incident response process?

A. Information criticality

B. Information scalability

C. Footprinting

D. Steganography

4. In an “old school” attack, which step is a listing of the systems and vulnerabilities to build an attack game plan.

A. Scanning

B. Footprinting

C. Enumeration

D. Pilfering

5. Which infection method involves planting malware on a Web site that the victim employees will likely visit?

A. Watering hole attack

B. Spoofing

C. SQL injection attack

D. Remote administration Trojan (RAT) attack

6. Which term refers to the targeting of specific steps of a multistep process with the goal of disrupting the overall process?

A. Scanning

B. Footprinting

C. Kill chain

D. Indicator of compromise (IOC)

7. How is quarantine accomplished?

A. With the erection of firewalls that restrict communication between machines

B. By rebooting the infected machine as many times as needed

C. By encrypting the infected data on the network’s hard drive

D. With periodic patches of the infected systems

8. Which attack type is common, and to a degree, relatively harmless?

A. Port flooding

B. Port scan

C. Buffer overflow

D. SQL injection

9. What tool is the protocol/standard for the collection of network metadata on the flows of network traffic?

A. Sniffer

B. Penetration test

C. NetFlow

D. NetStat

10. Which indicator of compromise (IOC) standard is a method of information sharing developed by MITRE?

A. Structured Threat Information eXpression (STIX)

B. Incident Object Description Exchange Format (IODEF)

C. OpenIOC

D. Cyber Observable eXpression (CybOX)

11. What are the three states of the data lifecycle in which data requires protection?

A. In storage, during encryption, and during backup

B. During processing, during encryption, and during deletion

C. In storage, in transit, and during processing

D. During identification, during encryption, and during backup

12. Which service allows organizations to share cyberthreat information in a secure and automated manner?

A. Cyber kill chain

B. Cyber Observable eXpression (CybOX)

C. Trusted Automated eXchange of Indicator Information (TAXII)

D. Structured Threat Information eXpression (STIX)

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Hi,

The problem has been solved. I have given the all answer below. The all questions are related to real life scenario and not written in any book so I have given my best answer. Please verify it.

----------------------------------

Ans 1: A low-impact exposure incident require the highest level of scrutiny statement applies to a lowimpact exposure incident.
C: A low-impact exposure incident require the highest level of scrutiny

Ans 2: Data classification and the quantity of data involved are the two components comprising information criticality.
C. Data classification and the quantity of data involved

Ans 3: Information scalability is the term refers to a key measure used to prioritize actions throughout the incident response process.
B. Information scalability

Ans 4: In an “old school” attack, Footprinting is the step to listing of the systems and vulnerabilities to build an attack game plan
B. Footprinting

Ans 5: Watering hole attack method involves planting malware on a Web site that the victim employees will likely visit.
A. Watering hole attack

Ans 6: Kill chain is the term refers to the targeting of specific steps of a multistep process with the goal of disrupting the overall process.
C. Kill chain

Ans 7: With the erection of firewalls that restrict communication between machines you can accomplished quarantine.
A. With the erection of firewalls that restrict communication between machines

Ans 8: SQL injection attack is common, and to a degree, relatively harmless.
D. SQL injection

Ans 9: NetStat is the command/tool to collect the network metadata on the flows of network traffic.
D. NetStat

Ans 10: Structured Threat Information eXpression (STIX) indicator of compromise (IOC) standard is a method of information sharing developed by MITRE.
A. Structured Threat Information eXpression (STIX)

Ans 11: Three states of the data lifecycle in which data requires protection are In storage, in transit, and during processing.
C. In storage, in transit, and during processing

Ans 12: Trusted Automated eXchange of Indicator Information (TAXII) service allows organizations to share cyberthreat information in a secure and automated manner.
C. Trusted Automated eXchange of Indicator Information (TAXII)

--------------------------------

The problem has been resolved, I hope you will like the answer. If you have any question or query regarding this problem or other, please comment below and give the positive rating.

Thank You!! Happy Learning!! !!

Add a comment
Know the answer?
Add Answer to:
Multiple Choice 1. Which statement applies to a lowimpact exposure incident? A. A low-impact expo...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 1-In which type of incident does a person or program, acting on behalf of another person,...

    1-In which type of incident does a person or program, acting on behalf of another person, perform an invalid action? a) Repudiation   b)Identity theft c)Subversion 2-What type of incident forces the victim to pay money to the attacker by threatening to reveal information that could lead to a severe loss for the victim? a) extortion b)harassment c)overpowering 3- Which incident-prevention strategy might involve the review of Internet Security and Acceleration (ISA) Server logs? a)defense-in-depth b)auditing c)scanning   d)detecting intrusions 4-Which of...

  • Multiple Choice (Choose the BEST answer!) 1) Intrapulmonary pressure is the A) pressure within the pleural...

    Multiple Choice (Choose the BEST answer!) 1) Intrapulmonary pressure is the A) pressure within the pleural cavity B) pressure within the alveoli of the lungs C) negative pressure in the intrapleural space D) difference between atmospheric pressure and respiratory pressure 2) Loss of fibrinogen within the plasma would most likely cause which of the following? A) fever with pain B) pallor (pale skin) C) edema (swelling) D) loss of blood clotting 3) Small secondary lymphoid organs, which cluster along lymphatic...

  • Multiple Choice Identify the choice that best completes the statement or answers the question 1. This...

    Multiple Choice Identify the choice that best completes the statement or answers the question 1. This therapeutic communication technique involves putting words to the person's emotional reaction, which acknowledges the person's feelings a. Clarification b. Silence c. Restatement d. Reflection e. Summarizing 2. This therapeutic communication technique allows the listener to get additional information. The listener can ask, "Do you mean Clarification b. Silence a. c. Restatement d. Reflection Summarizing 3. This therapeutic communication technique involves rewording a statement to...

  • Subject: Principles of Information Security True/False Traffic that is encrypted will typically pass by an intrusion...

    Subject: Principles of Information Security True/False Traffic that is encrypted will typically pass by an intrusion prevention system untouched. Performing cloud-based data loss prevention (DLP) is as simple as moving the enterprise edge methodology to the cloud. General UNIX baselining follows similar concepts as baselining for Windows OSs. Defense against attack begins by eliminating threats. A worm is malicious code that has to attach itself to something else to survive. With the availability of DNS blacklisting, pattern matching is no...

  • Quiz 5 Chapter 21 Multiple Choice Identify the choice that best completes the statement or newer...

    Quiz 5 Chapter 21 Multiple Choice Identify the choice that best completes the statement or newer the question 1. In this chapter, media is defined as a type of communication. b. a type of ink. c. data storage devices. d. A and C 2. What statement is not correct? a. A personal computer is a single user electronic data processing device. b. A personal computer and peripheral devices are hardware. c. Output devices allow data to be entered into the...

  • Quiz 10 1. (2 points) Which of the following conditions would lead to the highest levels of lac operon expression? a) High lactose, high glucose b) High lactose, low glucose c) Low lactose, high...

    Quiz 10 1. (2 points) Which of the following conditions would lead to the highest levels of lac operon expression? a) High lactose, high glucose b) High lactose, low glucose c) Low lactose, high glucose d) Low lactose, low glucose e) None of the above would have any lac operon expression 2. (2 points) Which of the following is true concerning molecular genetics? a) tRNA carries amino acids into the nucleus in eukaryotic cells b) DNA polymerase moves towards the...

  • Multiple Choice Identify the choice that best completes the statement or at the question 1. ALOK,...

    Multiple Choice Identify the choice that best completes the statement or at the question 1. ALOK, the entropy of a perfect crystal is -0 d. > 0, -0, or <0, depending on the chemical structure of the crystal e > 0 or=0. depending on the chemical structure of the crystal 2. At constant and P. any reaction will be spontaneous if a. ME> AS. b. MG.0. .. . C AS..> 3. The following figures represent distributions of two types of...

  • 1. Which of the following statements is true? Multiple Choice A. The primary sign of diabetes...

    1. Which of the following statements is true? Multiple Choice A. The primary sign of diabetes mellitus is hypoglycemia. B. A person with type 1 diabetes who takes too much insulin is likely to experience hyperglycemia. C. In the United States, type 2 diabetes is more common than type 1 diabetes. D. By losing excess weight, a person can reduce his or her risk of type 1 diabetes. 2. Kevin's total blood cholesterol level is 190 mg/dl and his HDL...

  • Part 1: Multiple-choice questions (2 points each) - Which of the following steps or processes in...

    Part 1: Multiple-choice questions (2 points each) - Which of the following steps or processes in aerobic respiration DIRECTLY consumes molecular oxygen (O2)? a. Glycolysis. b. Oxidative decarboxylation of pyruvate. c. The citric acid cycle. d. Oxidative phosphorylation. Beta-oxidation. 2- Gluconeogenesis is a(n) pathway. a condensation. b. catabolic c.) anabolic d. amphibolic e. photosynthetic 3. Because it is a degradative pathway that also generates biosynthetic precursors, the citric acid cycle is an) pathway. a. condensation. b) catabolic c. anabolic d....

  • 1. Does secondhand smoke increase the risk of a low weight birth? A baby is “low...

    1. Does secondhand smoke increase the risk of a low weight birth? A baby is “low birth weight” if it weighs less than 5.5 pounds at birth. According to the National Center of Health Statistics, about 7.8% of all babies born in the U.S. are categorized as low birth weight. Researchers randomly select 1200 babies whose mothers had extensive exposure to secondhand smoke during pregnancy. 10.4% of the sample are categorized as low birth weight. Which of the following are...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT