Quiz: Module 06 Flashcards

1
Q

The process of evaluating the circumstances around organizational events includes determining which adverse events are possible incidents, or ____.
a. critical violations
b. incident candidates
c. hacker intrusions
d. service alarms

A

b. incident candidates

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

_____ is the process of gathering information about the organization and its network activities and the subsequent process of identifying network assets by a potential attacker.
a. fingerprinting
b. footholding
c. precursor estimating
d. footprinting

A

a. fingerprinting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is not a “possible indicator” of an incident?
a. presence of unfamiliar files
b. presence or execution of unknown programs or processes
c. presence of hacker tools
d. unusual consumption of computing resources

A

c. presence of hacker tools

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Most organizations will find themselves awash in incident candidates at one time or another, and the vast majority will be ____.
a. definite indicators
b. reported attacks
c. unusual system crashes
d. false positives

A

d. false positives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Software designed to penetrate security controls, identify valuable content, and then encrypt files and data in place in order to extort payment for the key needed to unlock the encryption is known as _____.
a. ransomware
b. cryptojacking
c. pharming
d. data mining

A

a. ransomware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The cyber kill chain involves evaluating the circumstances around organizational events and determining which adverse events are possible incidents.
a. True
b. False

A

b. False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Many attacks come through network ports and then attack legitimate processes to allow themselves access or to conduct subsequent attacks.
a. True
b. False

A

a. True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

To help make the detection of actual incidents more reliable, there are three broad categories of incident indicators that have been identified: possible, probable, and definite.
a. True
b. False

A

a. True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

One of the more commonly seen and most easily avoided incidents is the denial-of-service attack.
a. True
b. False

A

b. False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The detection of intrusions is a straightforward process easily performed by entry-level staff.
a. True
b. False

A

b. False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly