quiz 10 Flashcards

1
Q

Risk management can be defined as the identification, assessment, and prioritization of risks.

A

True—Risk management is defined as the identification, assessment, and prioritization of risks, and mitigating and monitoring those risks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

One of the strategies an organization might employ when managing a particular risk is to accept none of the risk.

A

False—There are four general strategies an organization might employ including transferring the risk, avoiding the risk, reducing the risk, and accepting some or all the consequences of a risk. It is not possible to accept none of the risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The ultimate goal of risk management is to reduce all risk to a level acceptable to the organization.

A

True—It is impossible to remove all risk, but the ultimate goal of risk management is to reduce risk to an acceptable level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

. Qualitative risk assessment measures risk by using exact monetary values.

A

False—Qualitative risk assessment assigns numeric values to the probability of a risk. Quantitative risk assessment measures risk by using exact monetary values.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

SLE X ALE = ARO

A

False—SLE X ARO = ALE.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Passive security analysis is when actual hands-on tests are run on a system.

A

False—Passive security analysis is when servers and other devices are not affected by your scans. Actual hands-on tests are run during active security analysis.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

. In the five steps of vulnerability management, prioritizing vulnerabilities should happen before mitigation of vulnerabilities.

A

True—In the five steps of vulnerability management, prioritization is third and mitigation is fourth, followed up by monitoring.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

OVAL is a type of penetration testing.

A

False—OVAL is not a type of penetration testing; it is a standard designed to regulate the transfer of secure public information across networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

LAN Surveyor is a type of vulnerability scanner.

A

False—LAN Surveyor is a type of network mapping tool.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A cryptanalysis attack is a type of password-cracking method.

A

True—A cryptanalysis attack is one of the strongest types of password-cracking methods.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
Which of the following is when a prearranged list of likely words is attempted one at a time? 
A. Brute force attack 
B. Dictionary attack 
C. Cryptanalysis attack 
D. Guessing
A

B. A dictionary attack uses a prearranged list of likely words, trying each one at a time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q
Which of the following is a protocol analyzer? 
A. Nessus 
B. Cain and Abel 
C. Wireshark 
D. John the Ripper
A

C. Wireshark is a protocol analyzer. Nessus is a vulnerability scanner. Cain and Abel and John the Ripper are password-cracking tools.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
You are contracted to conduct a forensics analysis of the computer. What should you do first? 
A. Back up the system. 
B. Analyze the files. 
C. Scan for viruses. 
D. Make changes to the operating system.
A

A. Back up the system before you do anything else. This way, you have a backup copy in the case that anything goes wrong when you analyze or make changes to the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
Which of the following is a vulnerability assessment tool? 
A. John the Ripper 
B. AirSnort 
C. Nessus 
D. Cain & Abel
A

C. Nessus is a vulnerability assessment tool. AirSnort is used to crack wireless encryption codes. John the Ripper and Cain and Abel are password-cracking programs.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What do hackers use malicious port scanning to accomplish?
A. The “fingerprint” of the operating system
B. The topology of the network
C. All the computer names on the network
D. All the usernames and passwords

A

A. Port scanning can be used in a malicious way to find out all the openings to a computer’s operating system; this is known as the “fingerprint” of the operating system. Port scanning cannot find out the topology of the network, computer names, usernames, or passwords.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

When conducting a risk assessment, which of the following should you do after identifying threats and threat likelihood? (Select the two best answers.)
A. Identify the organization’s assets.
B. Identify vulnerabilities.
C. Identify a potential monetary impact.
D. Identify the impact assessment.

A

C and D. Step three of general risk assessments is identifying threats and threat likelihood. Afterward, you should identify a potential monetary impact, which is also known as impact assessment.

17
Q
Which of the following is the amount of times per year that a specific incident occurs? 
A. SLE 
B. ARO 
C. ALE 
D. MAC
A

B. ARO (annualized rate of occurrence) is the amount of times per year that a specific incident occurs.

18
Q
Which of the following can be defined as the loss of value in dollars based on a single incident? 
A. SLE 
B. ARO 
C. ALE 
D. MAC
A

A. SLE (single loss expectancy) is the loss of value in dollars based on a single incident.

19
Q
Which of the following uses the equation SLE X ARO = ALE? 
A. Qualitative risk assessment 
B. Passive security analysis 
C. Quantitative risk assessment 
D. Active security analysis
A

C. Quantitative risk assessment uses the equation SLE X ARO = ALE.

20
Q

Which of the following are examples of penetration testing methods? (Select the two best answers.)
A. The open source security testing methodology manual
B. OVAL
C. NIST penetration testing
D. CERDEC

A

A and C. The open source security testing methodology manual (OSSTMM) and NIST penetration testing are examples of penetration testing methods.