Set 04 Flashcards
(11 cards)
Q41: "The effectivness, efficiency and satisfaction with which specified users achieved specified goals in particular environment? this is the definition of "usability" by A. ANSI B. OWAPS C. ISO D. NIST
C. ISO
Q41: Consist of principles which refer to security architecture, precise controls and engineering process management?
A. Security Architecture and Design
B. Security Capability and Intrinsic Behaviours
C. Life Cycle Security
D. All of Above
D. All of Above
Q42: \_\_\_\_\_ is the nujmber of characters that most humans can commit to STM without overload A. 12 B. 3 C. 7 D. 6
C. 7
Q43: In a scenario where the data belongs to the sender and the recipient act as the data process is an example of? A. In house processing B. Outsourcing C. Data processing D. None of the above
D. None of the above
Q44: Component-driven methods are good for
A. Bringing together multiple stakeholders views of what a system should and should not do
B. Exploiting security breaches which emerge out of the complex interactions of many parts of your system
C. Establishing system security requirements before you have decided on the system is exact physical design.
D. Analyzing the risk faced by individuals technical components.
D. Analyzing the risk faced by individuals technical components.
Q45: “International and national statuary and regulatory requirements, compliance obligations and security ethics including data protections and developing doctrines a cyber warfare”
Which of the following option describes the above - mentioned statement?
A. Human Factors
B. Privacy & Online Rights
C. Risk Management & Governance
D. Law & Regulations
D. Law & Regulations
Q46: In SIEM data collection, the transport protocol defines how the alert blistering is migrated from one place to another.
What are the example of transport protocols?
A. Syslog, IDXP, HTTP or AMQP
B. CLNP Connections Networking Protocol & HSRP Hot Standby Router Protocal
C. VRRP Virtua; Router Redundancy Protocol & S7 Signing protocol
D. Ethernet and TCP/IP
A. Syslog, IDXP, HTTP or AMQP
Q47: \_\_\_\_\_ is a principle where conditions appear from previous decisions about said systems A. Precautionary Conditions B. Latent Design Conditions C. NIST conditions D. None of above
B. Latent Design Conditions
Q48: Which is an incident management functions specific to cybersecurity? A. Backup and Restore B. Security Monitoring C. Recovery files D. None of the above
B. Security Monitoring
Q49: Which of the following is NOT a core Concept of Risk Assessment? A. Impact B. Risk Analysis C. Likelihood D. Vulnerability
B. Risk Analysis
Q50: The Domain Name translates domain names, significantly bits of text to IP address need for network communications. The DNS protocol is also a regular DDOs enhancer as it is likely for an attacker to impersonate the IP address of a target in a DNS request, this triggering the DNS server to send unwanted traffic to the target.
What other protocols are prone to amplification?
A. S7 Signifying protocol
B. NTP Network Time Protocol
C. TCP/IP
D.ARP
B. NTP Network Time Protocol