All Flashcards

(41 cards)

1
Q

What is the main goal of knowledge sharing in an organization?

A

To improve absorptive and innovation capacity for sustained competitive advantage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the primary role of daily checkpoints in project management?

A

To ensure objectives and deadlines are met

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What should be documented in a Project Escalation Matrix?

A

Escalation paths, personnel, and their roles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Why are team leaders typically not included in escalation matrices?

A

They do not possess the necessary level of power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the purpose of using secure Out-of-Band (OOB) communication channels?

A

To ensure communication remains independent and secure from network attacks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is the benefit of regular project updates to stakeholders?

A

It helps in identifying risks early and managing the budget

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is the first phase in the Project Management Engagement Life Cycle?

A

Initiating

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is included in the scoping stage of project management?

A

Report requirements, communication processes, and objectives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Non-Disclosure Agreement (NDA)?

A

A contract that binds two parties to not disclose sensitive information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

In the review phase of a project, what is a key activity?

A

Evaluating whether objectives were achieved and the project was successful

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

How should reports be communicated to C-level executives?

A

Simplified and concise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is a link analysis graph used for?

A

To present complicated links between related intelligence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is a key risk posed by threat engagements?

A

Impacting live systems and scope creep

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does ISO 31000 provide guidelines for?

A

Managing risk faced by organizations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is ISO 27001 focused on?

A

Establishing and improving information security management systems (ISMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is ISO 27001 focused on?

A

c) Establishing and improving information security management systems (ISMS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What does ISO 22301 address in an organization?

A

b) Business continuity during disruptive incidents

18
Q

What is the purpose of ISO 27005?

A

b) To describe risk management processes for information and cybersecurity

19
Q

What is the role of a CERT?

A

c) To respond to cyber emergencies

20
Q

Which regulatory scheme is designed for the financial sector?

21
Q

What does the NCSC Cyber Incident Response Scheme aim to achieve?

A

b) Making the UK more cyber resilient

22
Q

What is the primary purpose of IPv4?

A

b) To assign a unique IP address to devices for Internet connectivity

23
Q

What is a public IP address used for?

A

c) Identifying a device on the wider Internet

24
Q

Why was IPv6 developed?

A

c) To solve IPv4 address exhaustion

25
What does TCP ensure in a network conversation?
c) Data packets are delivered in sequence and without errors
26
Which protocol is primarily used for low-latency, loss-tolerating communication?
b) UDP
27
What is the main function of ICMP?
b) To send error messages and operational information
28
Which VPN protocol is the most secure but has the drawback of being slow and potentially cracked by NSA?
c) L2TP/IPSec
29
Which VPN protocol is owned by Microsoft and supports AES-256 encryption but is not open for public review?
c) SSTP
30
Which tunneling protocol is known for being open-source, fast, and modern but still considered experimental?
c) Wireguard
31
In an amplification attack, what does the attacker primarily exploit?
b) A vulnerable service that responds with a large reply
32
What type of attack is TCP/IP hijacking?
b) A man-in-the-middle attack
33
Which cryptographic method uses two keys, a public key, and a private key?
b) Asymmetric encryption
34
Which encryption algorithm is symmetric and applies the DES cipher algorithm three times to each data block?
c) Triple DES
35
Which cryptographic algorithm is considered a standard for secure communications and can use 128, 192, or 256-bit encryption?
c) AES
36
What type of vulnerability is considered highly valuable because it is unknown to the vendor or product owner?
b) Zero-day vulnerability
37
Which of the following is an intrusion vector where attackers compromise a website that the target frequently visits?
b) Watering hole attack
38
What is OWASP known for?
c) Offering free resources for web application security
39
Which attack method involves hiding information in an image or video file to exfiltrate data?
b) Steganography
40
Which ransomware group is known to be linked with North Korean threat actors?
c) Lazarus
41
Which term refers to the process of removing event logs or other forensic evidence from a compromised system?
c) Indicator removal from hosts