EMERGING THREATS AND COUNTERMEASURES-Assignment help

Take Test: – ITS834 FINAL EXAM
Test Information Description Instructions
Multiple Attempts Not allowed. This test can only be taken once.
Force Completion This test can be saved and resumed later.
Question Completion Status:
Q U E S T I O N 1
Security risk levels need to be linked to actionable items.
True False
2 points Save Answer
Q U E S T I O N 2
The following can be said of single sign-on (SSO) initiatives, EXCEPT
A. they reduce the need for other authentication protocols.
2 points Save Answer
B. they would be embraced by end users.
C. they do not provide the ideal level of security protection.
D. none of the above.
Q U E S T I O N 3
A security policy for national infrastructure should be all of the following, EXCEPT
A. enforceable.
B. short and as to the point as necessary.
C. printed in a manual available to managers to disseminate as they deem necessary.
D. inclusive of proper computing and networking elements in the local national infrastructure.
2 points Save Answer
Q U E S T I O N 4
Sampling data
A. is useful for detailed forensic analysis.
B. is a short-cut for lazy security analysts.
C. is less time consuming, but unsampled data might reveal more vulnerabilities.
D. is less time consuming, and rarely are key indicators missed.
2 points Save Answer
Q U E S T I O N 5
The four distinct analytic methods for correlating cyber security information include all of the following, EXCEPT
A. profile-based correlation
B. domain-based correlation
C. geography-based correlation
2 points Save Answer
D. time-based correlation
Click Save and Submit to save and submit. Click Save All Answers to save all answers.
Q U E S T I O N 6
2 points Save Answer
A. newer netbooks and smart phones.
B. every computer made since 1992.
C. plain old telephone services.
D. all of the above
Q U E S T I O N 7
The idea that all information should be free
A. is a principle guaranteed by the Constitution.
B. is a belief shared by many in the hacking community.
C. is as good for business as it is for sound government.
D. is, ironically, foundational to the creation of a sound security program.
2 points Save Answer
Q U E S T I O N 8
The daily trivia around known vulnerability information is
A. important to collect in order to maintain situational awareness.
B. extremely valuable and a significant proportion of security resources should be dedicated to gathering and sharing this information with the security team.
C. relatively useless for day-to-day security operations
2 points Save Answer
D. all of the above
Q U E S T I O N 9
Government agencies are the most aggressive in promoting information sharing.
True False
2 points Save Answer
Q U E S T I O N 1 0
Security managers eagerly adopt diversity methods because of their cost-effectiveness.
True False
2 points Save Answer
Q U E S T I O N 11
Determining the effectiveness of depth requires
A. lots and lots of analytical tools and as much data as possible.
B. good data and the experience necessary to make an educated guess.
C. an encyclopedic knowledge of similarly protected systems.
D. all of the above.
2 points Save Answer
Q U E S T I O N 1 2
Signature-based correlation involves comparing a signature pattern of a known malicious condition to observed activity.
2 points Save Answer
True False
Q U E S T I O N 1 3
A culture of security protection has to be rigid and authoritative, even a little paranoid.
True False
2 points Save Answer
Click Save and Submit to save and submit. Click Save All Answers to save all answers.
Q U E S T I O N 1 4 2 points Save Answer
Time-base correlation
B. compares data collected during one time period with data collected at a different time.
C. is often useful for detecting quick attacks in real time.
D. none of the above
Q U E S T I O N 1 5
A major problem with firewalls would be that
A. as rules increase, the added complexity creates room for error.
B. firewalls are easily compromised.
C. they are unable to allow selective access to designated systems.
D. all of the above
2 points Save Answer
Q U E S T I O N 1 6
With domain-based correlation you compare data from one domain with data collected from the same domain at an earlier time.
True False
2 points Save Answer
Q U E S T I O N 1 7
The term national infrastructure can refer to
A. mobile telecommunications.
B. law enforcement databases.
C. military support services.
D. all of the above.
2 points Save Answer
Q U E S T I O N 1 8
For simplifying communication, risk should be categorized as low, medium, or high.
True False
2 points Save Answer
Q U E S T I O N 1 9
During the forensic analysis stage, typical questions that might be asked would include
A. What vulnerabilities were exploited in the attack?
2 points Save Answer
B. How quickly did the response team react?
C. What, if any, disciplinary action should be taken?
D. all of the above.
Q U E S T I O N 2 0
Data collection is critical for detecting malicious activity.
2 points Save Answer
True False
Q U E S T I O N 2 1
Any incident response process will include all of the following, EXCEPT
A. an incident trigger.
2 points Save Answer
B. expert gathering.
C. recording incident data to share with security community.
D. incident analysis.
Click Save and Submit to save and submit. Click Save All Answers to save all answers.
Q U E S T I O N 2 2 2 points Save Answer
have added a layer of complexity to network protection.
B. have made it easier to protect networks from unauthorized access.
C. do not yet have the functionality that would make them a risk to network security.
D. all of the above
Q U E S T I O N 2 3
Infrastructure simplification tackles design problems that complicate security programs, such as
A. allowing multiple clients to access the Internet.
B. the clouding of obvious connectivity.
C. the use of multiple servers.
D. all of the above
2 points Save Answer
Q U E S T I O N 2 4
24/7 operational support will help national response teams dealing with the management of multiple incidents.
2 points Save Answer
True False
Q U E S T I O N 2 5
Deception is effective because it will even protect unknown vulnerabilities.
True False
2 points Save Answer
Q U E S T I O N 2 6
Service level agreements
2 points Save Answer
A. help guarantee quality of data.
B. do much to keep a steady flow of data, but the quality is often unreliable.
C. can guarantee data that is of the same quality as volunteered data.
D. none of the above
Q U E S T I O N 2 7
There is a robust national data collection process that should be emulated by private companies.
2 points Save Answer
True False
Q U E S T I O N 2 8
Sensitive information can be disclosed in different ways, EXCEPT
A. bringing a laptop home to get some work done at night.
B. stray comments in a coffee shop.
C. documents inadvertently left on the subway.
D. deliberate leaks.
2 points Save Answer
Q U E S T I O N 2 9
A list of early warning process triggers that would initiate a response would include all of the following, EXCEPT
A. information on new vulnerabilities.
2 points Save Answer
B. a swing in an organization’s value on the NYSE.
Click SCa.vaemanatdchSounbmattiatctkomsaevtreicapnadttesrunb. mit. Click Save All Answers to save all answers.
D. anomalies discovered in infrastructure components.
Q U E S T I O N 3 0
Which of the following is NOT a true statement about a trusted computing base (TCB).
A. A TCB is the totality of hardware, software, processes, and individuals who are considered essential to overall security
B. A TCB had better include both essential and a careful selection of non-essential processes.
C. A TCB is more easily protected when it is small and not overly complex.
D. none of the above.
2 points Save Answer
Q U E S T I O N 3 1
During the scanning stage, an adversary might
A. search for web-based information.
B. scan a network to see if there are any open ports.
C. may read through newspaper articles about an organization for clues to their network architecture.
D. all of the above
2 points Save Answer
Q U E S T I O N 3 2
Home PC users are usually aware that they are participating in a botnet attack.
True False
2 points Save Answer
Q U E S T I O N 3 3
A botnet attack…
A. involves tiny robots sent to record physical computing environments with the intent of gathering passwords and other information that would help an adversary.
B. is a defensive tactic used by security professionals to trap adversarial bots.
C. involves a large number of compromised end-user machines, usually broadband-connected PCs, to launch coordinated attacks.
D. can be detected by the signature “net” it casts over a system, collecting vast amounts of data for recognizance purposes.
2 points Save Answer
Q U E S T I O N 3 4
Having a robust back-loaded recovery process is more important than front-loaded prevention, especially when dealing with national infrastructure.
True False
2 points Save Answer
Q U E S T I O N 3 5
National infrastructure protection will require either centralized or distributed security, but having both creates problems.
True False
2 points Save Answer
Q U E S T I O N 3 6
Which of the following are possible motivations for an infrastructure attack?
A. country-sponsored warfare
B. looking to build a rep in the hacker community
C. terrorist attack
D. all of the above
2 points Save Answer
Q U E S T I O N 3 7
Click Save and Submit to save and submit. Click Save All Answers to save all answers.
Introducing diversity into a system is
A. cost effective.
2 points Save Answer
often leads to office in-fighting among security managers of differing views.
D. all of the above.
Q U E S T I O N 3 8
The threat of a worm program is lessened by the introduction of diversity because
A. worm programs rely on interoperable systems to propagate.
B. different systems each have their own worms competing for exploitable space.
C. diversity creates an environment where anti-worm software can thrive.
D. all of the above
2 points Save Answer
Q U E S T I O N 3 9
Deception works because it helps accomplish all of the following security goals, EXCEPT
A. directing attention away from real assets.
B. wasting an adversary’s time and energy.
C. allowing analysts a chance to watch an adversary’s behavior in real time.
D. denying an adversary’s access to critical assets.
2 points Save Answer
Q U E S T I O N 4 0
The observation that “any layer of protection can fail at any time”
A. is simply disheartening.
B. leads to the idea that protection should rely more on physical separation.
C. is the justification for a strategy called “defense in depth.”
D. none of the above.
2 points Save Answer
Q U E S T I O N 4 1
One goal of separation is to separate an asset from an adversary.
True False
2 points Save Answer
Q U E S T I O N 4 2
Just acknowledging publically that an asset is protected by honey pots can be a deterrent.
True False
2 points Save Answer
Q U E S T I O N 4 3
An organization’s current security risk is determined by which of the following?
A. consulting with security professionals at other organizations
B. factoring in all elements of situational awareness and any related challenges
C. the proper installation and use of security risk monitoring software
D. all of the above
2 points Save Answer
Q U E S T I O N 4 4
Which of the following is true of data collection:
A. Data collection is of secondary importance to computer security.
B. Data collection should emulate a very effective national collection process.
C. Data collection should not be attempted until there’s a plan in place to analyze and protect the data.
D. Click Save and Submit to save and submit. Click Save All Answers to save all answers. Q U E S T I O N 4 5 2 points Save Answernone of the above
2 points Save Answer
True False Q U E S T I O N 4 6 2 points Save Answer Collecting data from all relevant computers A. is an important goal, even though the capacity to do so doesn’t exist yet. B. will never be possible since the amount of data will increase right along with the capacity to store it. is only helpful if everyone is using a Windows-based operating system. relies on a government strong enough to force citizens to give up their data. Q U E S T I O N 4 7 2 points Save Answer Security features should be meaningful; whether or not they are measurable is irrelevant. True False Q U E S T I O N 4 8 2 points Save Answer Awareness of security posture requires consideration of which of the following? known vulnerabilities security infrastructure business environment all of the above Q U E S T I O N 4 9 2 points Save Answer Any given layer of protection can fail at any time. True False Q U E S T I O N 5 0 2 points Save Answer The larger a trusted computing base (TCB) the easier it is to protect. True False
Click Save and Submit to save and submit. Click Save All Answers to save all answers.

Calculate a fair price for your paper

Such a cheap price for your free time and healthy sleep

1650 words
-
-
Place an order within a couple of minutes.
Get guaranteed assistance and 100% confidentiality.
Total price: $78
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, how can I help?