CDS 348 Final Exam
One of the more commonly seen and most easily avoided incidents is the "blank"
attack, where employees are bombarded with numerous attempts to convince them to
activate a link embedded in an e-mail or respond to a request for communications with
an unknown outside party, often masquerading as a known entity
Phishing
a staffed control room where key security technologies, networks, and critical systems
are monitored for incidents is known as a(n)
security operations center
if an intruder can blank a device, then no electronic protection can deter the loss of
information
physical access
A(n) blank may signal an adverse event is under way and provide a notification of an
incident candidate
Indicator
blank is the organized research and investigation of Internet addresses owned or
controlled by a target organization
footprinting
a series of steps that follow the stages of a cyberattack from early reconnaissance to
the exfiltration of data is known as the blank
cyber kill chain
A(n) blank may signal an incident that could occur in the future
Precursor
the theft of organizational data, either physically or by extraction through the owners'
networks is called data blank
exfiltration
NIST SP 800-61, Rev. 1 provides a five category classification scheme for a networkbased incidents that includes each of these except
all of these are NIST incident classification
a set of software functionalities with capabilities that different clients can reuse for
different purposes is called a(n) blank
service
Category | Study Material |
Comments | 0 |
Rating | |
Sales | 0 |