Set 04 Flashcards

(11 cards)

1
Q
Q41: "The effectivness, efficiency and satisfaction with which specified users achieved specified goals in particular environment?
this is the definition of "usability" by
A. ANSI
B. OWAPS
C. ISO
D. NIST
A

C. ISO

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Q41: Consist of principles which refer to security architecture, precise controls and engineering process management?
A. Security Architecture and Design
B. Security Capability and Intrinsic Behaviours
C. Life Cycle Security
D. All of Above

A

D. All of Above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Q42: \_\_\_\_\_ is the nujmber of characters that most humans can commit to STM without overload
A. 12
B. 3
C. 7
D. 6
A

C. 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Q43: In a scenario where the data belongs to the sender and the recipient act as the data process is an example of?
A. In house processing
B. Outsourcing
C. Data processing
D. None of the above
A

D. None of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Q44: Component-driven methods are good for
A. Bringing together multiple stakeholders views of what a system should and should not do
B. Exploiting security breaches which emerge out of the complex interactions of many parts of your system
C. Establishing system security requirements before you have decided on the system is exact physical design.
D. Analyzing the risk faced by individuals technical components.

A

D. Analyzing the risk faced by individuals technical components.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Q45: “International and national statuary and regulatory requirements, compliance obligations and security ethics including data protections and developing doctrines a cyber warfare”
Which of the following option describes the above - mentioned statement?
A. Human Factors
B. Privacy & Online Rights
C. Risk Management & Governance
D. Law & Regulations

A

D. Law & Regulations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Q46: In SIEM data collection, the transport protocol defines how the alert blistering is migrated from one place to another.
What are the example of transport protocols?
A. Syslog, IDXP, HTTP or AMQP
B. CLNP Connections Networking Protocol & HSRP Hot Standby Router Protocal
C. VRRP Virtua; Router Redundancy Protocol & S7 Signing protocol
D. Ethernet and TCP/IP

A

A. Syslog, IDXP, HTTP or AMQP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Q47: \_\_\_\_\_ is a principle where conditions appear from previous decisions about said systems
A. Precautionary Conditions
B. Latent Design Conditions
C. NIST conditions
D. None of above
A

B. Latent Design Conditions

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Q48: Which is an incident management functions specific to cybersecurity?
A. Backup and Restore
B. Security Monitoring
C. Recovery files
D. None of the above
A

B. Security Monitoring

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
Q49: Which of the following is NOT a core Concept of Risk Assessment?
A. Impact
B. Risk Analysis
C. Likelihood
D. Vulnerability
A

B. Risk Analysis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Q50: The Domain Name translates domain names, significantly bits of text to IP address need for network communications. The DNS protocol is also a regular DDOs enhancer as it is likely for an attacker to impersonate the IP address of a target in a DNS request, this triggering the DNS server to send unwanted traffic to the target.
What other protocols are prone to amplification?
A. S7 Signifying protocol
B. NTP Network Time Protocol
C. TCP/IP
D.ARP

A

B. NTP Network Time Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly