Set 07 Flashcards

(10 cards)

1
Q

Q71: Capturing the MAC layer is doable but needs an explicit configuration. Capturing the MAC layer is mandatory to identify attacks like ARP poisoning. For the definite categories of industrial control networks that execute right on top of the Ethernet layher, capturing traffic involves adding a node and could change real-time conventions.
Understanding the information available in the MAC layer requires what?
A. The configuration of the network segment to which the collection network interfaced is attached.
B. Understanding of network architecture
C. Design configuration of the whole network interface
D. Network configuration in promiscuous mode.

A

A. The configuration of the network segment to which the collection network interfaced is attached.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
Q72: As with any process of risk management, a key calculation relates to expected impact, being calculated from some estimate of likelihood of events that may lead to impact, and an estimate of the impact arising from those events. 
Which is NOT an element of likelihood?
A. Command and Control
B. Presence of vulnerability
C. Nature of the threat
D. All of the above
A

A. Command and Control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
Q73: Systems benefit from a uniform approach to security infrastructure.  Which is NOT a part of this approach?
A. Intrusion Detection
B. Reconnaissance
C. Roles
D. User Access
A

C. Roles

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
Q74: Which of the following is not a type of peer-to-peer cyber-crime?
A. Injecting trojans to a target victim
B. MiTm
C. Phishing
D. Credit Card details mask in deep web.
A

D. Credit Card details mask in deep web.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Q75: Why are chances in passive security indicators often missed by human, particularly if they are on the edges of the screen?
A. Human do not have the physical and mental capacity to review such indicators
B. Humans are detecting anomates
C. Human are busy with alert signals.
D. Human can only focus on one back at any one time.

A

D. Human can only focus on one back at any one time.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q
Q76: Criteria by which usability is assessed?
A. Incompetence
B. Incapacity
C. Indecision
D. None of above
A

D. None of above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
Q77: The collection, analysis & reporting of digital analysis in support of incidents or criminal events
A Cryptography
B. Adversarial Behaviours
C. Law 7 Regulations
D. Forensics
A

D. Forensics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Q78: Which of the following is not a type of cybercrime?
A. Forgery
B. Data theft
C. Installing antivirus for protection
D. Damage to data and systems
A

C. Installing antivirus for protection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
Q79: Experts proposed a framework to systematize the attribution efforts of cyberattacks, which of the following is NOT a layer of this framework
A. Operational
B. Strategic
C. Tactical
D. Analytical
A

C. Tactical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

80: The very noticeable zone where autonomous network-oriented mitigation is essential is Denial of Service (DoS) and principally large-scal is
DDos attacks have increased ____
A. In terms of volume and number of sources
B. In the context of vulnerability
C. With respect to loss of data
D. None of the above

A

A. In terms of volume and number of sources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly