Zusammenfassung der Ressource
Frage 1
Frage
The potential source of an adverse event” is known as a _________?
Antworten
-
Compromise
-
Vector
-
Threat
-
Countermeasure
Frage 2
Frage
Which of the following actors is most likely to use tools they didn’t create and have little knowledge of?
Antworten
-
Black Hat
-
Script Kiddie
-
Malicious Hacker
-
Nation-State
Frage 3
Frage
Which of the following is most likely to be motivated by social, ideological, or political differences?
Antworten
-
Criminals
-
Hacktivists
-
Insiders
-
Ransomware
Frage 4
Frage
Which of the following best describes a vulnerability?
Antworten
-
A method
-
A weakness
-
An exploit
-
A control
Frage 5
Frage
Which of the following is NOT a factor in deciding risk?
Antworten
-
Vulnerability
-
Impact
-
Persistence
-
Threat
Frage 6
Frage
Which of the following often delays the timely installation of patches?
Antworten
-
Server patches always require changes in the network routers.
-
It takes time to test patches to ensure they do not adversely impact system functionality.
-
Patches change the log files of the device.
-
The Risk Management Framework mandates that we wait to install patches.
Frage 7
Frage
Why is keeping up with security patches so difficult?
Antworten
-
Users are untrained.
-
Patch management systems are too expensive.
-
Patches are required at multiple levels (applications, operating systems, firmware, etc.).
-
Printer problems demand more attention.
Frage 8
Frage
Which of the following is a weakness that attackers most often exploit?
Antworten
-
Complexity of the Risk Management Framework
-
Lack of network engineers
-
Misconfigured network switch settings
-
Lack of user awareness