CMP eREAD Flashcards

1
Q

True or False. Cybersecurity operations are driven by technical implementers

A

False. Cybersecurity programs are driven by senior leadership via governance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the name of the team that risk managers depend upon to assess whether work is being performed in accordance to policy?

A

Compliance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Risk __________ requires that activities with high levels of risk are stopped

A

Avoidance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What activity is focused on deconstructing a system to better understand the threats and exploits that might impact it?

A

Threat Modelling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The leadership teams would like to develop controls designed to provide oversight of various information systems. What type of control does this describe?

A

Managerial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A Web application firewall identifies and records any attempted or successful intrusion to a log file. What category of control does this describe?

A

Technical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

After identifying that a port scan was performed on an internal database system, a security analyst performs a series of well-defined steps to further investigate the issue. What type of control does this describe?

A

Responsive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is being analyzed when all potential pathways a threat actor could use to gain unauthorized access or control of a system are identified and documented?

A

Attack Surface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Systems, services and protocols are discovered and characterized by analyzing network packet captures. What type of discovery technique does this describe?

A

Passive discovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

True or False. Advanced endpoint protection tools eliminate the need for operating system patching

A

False. Patching is needed in addition to these tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

True or false. Critical security patches are best implemented during the next most convenient maintenance window

A

False. Critical patches should be implemented immediately

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What tool allows administrators to centrally create and enforce software settings?

A

Configuration management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or False. Systems should not be monitored during maintenance windows to avoid confusion

A

False. Monitoring should still occur. But be aware of what changes are anticipated during the maintenance window

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which policy dictates how work is completed during a maintenance window?

A

Change Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This threat actor group is generally associated with advanced persistent threats

A

Nation State

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

After gaining unauthorized access, an attacker takes time to remove evidence of the actions they performed. These actions are commonly known as _______-___________.

A

Anti-forensics

17
Q

This Framework provides very detailed documentation regarding threat actor tactic, techniques, and procedures.

A

MITRE ATT&CK

18
Q

True or False. Open -Source intelligence describes the use of Linux to identify potential attackers

A

False. Open-Source intelligence describes using openly available resources to look for information about threats

19
Q

What type of threat intelligence is only available via subscription or by purchasing specialty vendor-supported equipment?

A

Closed, or proprietary sourced intelligence

20
Q

What metric helps rank or score threat intelligence to help isolate applicable or highly likely threat intelligence?

A

Confidence level

21
Q

What activity is best defined by the “assume breach” mindset?

A

Threat hunting

22
Q

What term describes when an attacker has successfully moved to another system within the environment after gaining initial access?

A

Lateral Movement

23
Q

True or False. Indicators of attack (IoA) depend upon forensic evidence to identify that unauthorized access has occurred

A

False. Utilizing forensic evidence is more closely associated with indicators of compromise (IoC) or searching for evidence that a breach occurred in the past

24
Q

System intentionally created to appear vulnerable

25
Creates a unique fingerprint of a file
Hash
26
Attempts to recover source code from binary code
Decompiler
27
Scans a system for malicious software
Antivirus
28
Filters network connections based on source, destination, and port
Firewall
29
Determines which clients may access a wired or wireless network.
NAC (Network Access Control)
30
Deploys configuration settings to multiple Windows systems.
GPO (Group Policy Object)
31
Protects against SQL injection attacks
WAF (Web Application Firewall)
32
In which Linux directory are configuration files typically located?
/etc
33
Which type of cloud deployment model is the most common?
Hybrid
34
This Term describes how many organizations’ networks no longer have a clearly defined “inside” and “outside” boundary
Deperimeterization
35
This term describes the use of a PIN sent via SMS to a smartphone
2-step verification
36
If A trusts B and B trusts C, then A trusts C. What term describes this trust relationship?
Transitive
37
What is the enterprise management software designed to mediate user/employee access to cloud services?
Cloud Access Security Broker (CASB)