100% found this document useful (1 vote)
4K views36 pages

Cyber Threat Management Exam Answers

qUESTIONS AND ANSWERS

Uploaded by

ifeomadomendu2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
4K views36 pages

Cyber Threat Management Exam Answers

qUESTIONS AND ANSWERS

Uploaded by

ifeomadomendu2
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

11/4/24, 10:33 AM Cyber Threat Management (CyberTM) Course Final Exam Answers

 IT Questions Bank  IOS Command List  Ebooks  IP Calculators »

 Donations

Search the site 

 Home  CCNA » Security » CyberOps »

 IT Questions Bank  IOS Command List CCNA » CCNA Security v2.0 »

Cybersecurity » Networking Essentials IP Subnet Calculators » Donation Contact

CCNA v5 + v6.0 Exam


Answers

CCNA 1 CCNA 2 CCNA 3

CCNA 4

CCNA 1 - Pretest

CCNA 1 - Chapter 1

CCNA 1 - Chapter 2

CCNA 1 - Chapter 3

[Link] 1/36
11/4/24, 10:33 AM Cyber Threat Management (CyberTM) Course Final Exam Answers

Cyber Threat Management (CyberTM) CCNA 1 - Chapter 4

Course Final Exam Answers CCNA 1 - Chapter 5


 Jul 25, 2022 |  Last Updated: Jan 19, 2024 |
CCNA 1 - Chapter 6
 Cyber Threat Management |  22 Comments

 Share  Tweet  Share  Pin it


CCNA 1 - Chapter 6 Skills
PT

CCNA 1 - Chapter 7
Cyber Threat Management (CyberTM)
Course Final Exam Answers CCNA 1 - Chapter 8

CCNA 1 - Chapter 9
1. What are three disclosure exemptions that pertain to
the FOIA? (Choose three.) CCNA 1 - Chapter 10

law enforcement records that implicate one of a set CCNA 1 - Chapter 11


of enumerated concerns
CCNA 1 PT Practice Skills
information specifically non-exempt by statue
confidential business information CCNA 1 - Practice Final
non-geological information regarding wells
CCNA 1 - Final Exam
national security and foreign policy information
public information from financial institutions

Explanation: The nine Freedom of Information Act Related Posts


(FOIA) exemptions include the following:
6.1.6 Lab – Gather System
1. National security and foreign policy information Information After an Incident
2. Internal personnel rules and practices of an agency Answers
3. Information specifically exempted by statute
4.4.2 Endpoint Vulnerability Quiz
4. Confidential business information Answers
5. Inter- or intra-agency communication subject to
28.1.5 Check Your Understanding –
deliberative process, litigation, and other privileges
Identify the Type of Evidence
6. Information that, if disclosed, would constitute a clearly Answers
unwarranted invasion of personal privacy
Cyber Threat Management Exam
7. Law enforcement records that implicate one of a set of Answers
enumerated concerns
8. Agency information from financial institutions 5.3.5 Lab – Security Controls
Implementation Answers
9. Geological and geophysical information concerning
wells 23.2.7 Check Your Understanding –
Identify CVSS Metrics Answers

[Link] 2/36
11/4/24, 10:33 AM Cyber Threat Management (CyberTM) Course Final Exam Answers
✕ 5.4.2 Risk Management and
Security Controls Quiz Answers

Cyber Threat Management: My


Knowledge Check Answers

1.2.14 Lab – Create Your Personal


Code of Ethical Conduct Answers

7.2.2 Lab – Risk Management


Answers

Recent Comments
Jamesh Brown on Introduction to
2. A company is developing security policies. Which
Linux I – Chapter 13 Exam Answers
security policy would address the rules that determine 2019 + PDF file
access to and use of network resources and define the
dude on 11.10.2 Lab – Design and
consequences of policy violations?
Implement a VLSM Addressing
Scheme (Answers)
data policy
remote access policy Gabe on 7.4.1 Packet Tracer –
acceptable use policy Implement DHCPv4 – Instructions
Answer
password policy
Mathew on For each scenario,
select the best characteristic of
Explanation: An organization needs to establish clear
RAID that is described.
and detailed security policies. Some of these policies
are: Peter on CCNA 1 v7.0 Final Exam
Quiz – Test online
Password policy- Defines minimum password
requirements, such as the number and type of characters
used and how often they need to be changed.
Acceptable use policy- Highlights a set of rules that
determine access to and use of network resources. It
may also define the consequences of policy violations.
Remote access policy- Sets out how to remotely connect
to the internal network of an organization and explains
what information is remotely accessible.
Data policy- Sets out measurable rules for processing
data within an organization, such as specifying where
data is stored, how data is classified, and how data is
handled and disposed of.

[Link] 3/36
11/4/24, 10:33 AM Cyber Threat Management (CyberTM) Course Final Exam Answers

3. Which framework should be recommended for


establishing a comprehensive information security
management system in an organization?

ISO/IEC 27000
ISO OSI model
CIA Triad
NIST/NICE framework

Explanation: A cybersecurity specialist needs to be


familiar with the different frameworks and models for
managing information security.

4. If a person knowingly accesses a government


computer without permission, what federal act laws
would the person be subject to?

SOX
ECPA
GLBA
CFAA

Explanation: The Computer Fraud and Abuse Act


(CFAA) provides the foundation for US laws criminalizing
unauthorized access to computer systems.

5. Match the roles in the data governance program to the


description.

[Link] 4/36
11/4/24, 10:33 AM Cyber Threat Management (CyberTM) Course Final Exam Answers

Cyber Threat Management (CyberTM) Course Final Exam 5

Explanation: Place the options in the following order:

a person who oversees the data Data


protection strategy of an organization protection
officer

a person or organization who Data


processes personal data on behalf of processor
the data controller

a person who determines the Data


purposes for which, and the way in controller
which, personal data is processed

a person who ensures that data Data


supports the business needs of an steward
organization and meets regulatory
requirements

a person who ensures compliance Data owner


with policies and procedures,
assigns the proper classification to
information assets, and determines
the criteria for accessing information
assets
[Link] 5/36
11/4/24, 10:33 AM Cyber Threat Management (CyberTM) Course Final Exam Answers

a person who implements the Data


classification and security controls custodian
for the data in accordance with the
rules set out by the data owner.

MO-STACHE, MO-SAVINGS Get Started

6. What type of security test uses simulated attacks to


determine possible consequences of a real threat?

penetration testing
integrity checking
network scanning
vulnerability scanning

Explanation: There are many security tests that can be


used to assess a network. Penetration testing is used to
determine the possible consequences of successful
attacks on the network. Integrity checking is used to
detect and report changes made to systems.
Vulnerability scanning is used to find weaknesses and
misconfigurations on network systems. Network
scanning is used to discover available resources on the
network.

[Link] 6/36
11/4/24, 10:33 AM Cyber Threat Management (CyberTM) Course Final Exam Answers

7. What are two tasks that can be accomplished with the


Nmap and Zenmap network tools? (Choose two.)

Identification of Layer 3 protocol support on hosts


Password recovery
TCP and UDP port scanning
Validation of IT system configuratio
Password auditing

Explanation: Nmap is a low-level network scanner that


is available to the public and which has the ability to
perform port scanning, to identify open TCP and UDP
ports, and perform system identification. It can also be
used to identify Layer 3 protocols that are running on a
system.

8. Which network security tool can detect open TCP and


UDP ports on most versions of Microsoft Windows?

L0phtcrack
Zenmap
SuperScan
Nmap

Explanation: There are various network security tools


available for network security testing and evaluation.
L0phtcrack can be used to perform password auditing
and recovery. SuperScan is a Microsoft port scanning
software that detects open TCP and UDP ports on
systems. Nmap and Zenmap are low-level network
scanners available to the public.

9. Match the network security testing tool with the correct


function. (Not all options are used.)

[Link] 7/36
11/4/24, 10:33 AM Cyber Threat Management (CyberTM) Course Final Exam Answers

Cyber Threat Management (CyberTM) Course Final Exam 9

Explanation: Place the options in the following order:


used to assess if network devices are Tripwire
compliant with network security policies

used to scan systems for software Nessus


vulnerabilities

used for Layer 3 port scanning Nmap

10. Match the command line tool with its description.

[Link] 8/36
11/4/24, 10:33 AM Cyber Threat Management (CyberTM) Course Final Exam Answers

Cyber Threat Management (CyberTM) Course Final Exam


10

Explanation: Place the options in the following order:


Displays TCP/IP settings (IP address, ipconfig
subnet mask, default gateway, DNS,
and MAC information.

Gathers information from TCP and UDP netcat


network connections and can be used
for port scanning, monitoring, banner
grabbing, and file copying.

Assembles and analyzes packets for hping


port scanning, path discovery, OS
fingerprinting, and firewall testing.

Queries a DNS server to help nslookup


troubleshoot a DNS database.

11. What three services are offered by FireEye? (Choose


three.)

deploys incident detection rule sets to network security


tools
creates firewall rules dynamically
identifies and stops email threat vectors
identifies and stops latent malware on files

[Link] 9/36
11/4/24, 10:33 AM Cyber Threat Management (CyberTM) Course Final Exam Answers

subjects all traffic to deep packet inspection analysis


blocks attacks across the web

Explanation: FireEye is a security company that uses a


three-pronged approach combining security intelligence,
security expertise, and technology. FireEye offers SIEM
and SOAR with the Helix Security Platform, which use
behavioral analysis and advanced threat detection.

12. What is a characteristic of CybOX?

It is the specification for an application layer protocol that


allows the communication of CTI over HTTPS.
It enables the real-time exchange of cyberthreat
indicators between the U.S. Federal Government and the
private sector.
It is a set of standardized schemata for specifying,
capturing, characterizing, and communicating events
and properties of network operations.
It is a set of specifications for exchanging cyberthreat
information between organizations.

Explanation: CybOX is an open standards set of


standardized schemata for specifying, capturing,
characterizing, and communicating events and properties
of network operations that support many cybersecurity
functions.

13. What three security tools does Cisco Talos maintain


security incident detection rule sets for? (Choose three.)

ClamAV
Snort
Socat
NetStumbler
SpamCop

[Link] 10/36
11/4/24, 10:33 AM Cyber Threat Management (CyberTM) Course Final Exam Answers

Explanation: Talos maintains the security incident


detection rule sets for the [Link], ClamAV, and
SpamCop network security tools.

180° Lay-flat for


Cleaning Every Hidden
Area

14. Which security organization maintains a list of


common vulnerabilities and exposures (CVE) and is used
by prominent security organizations?

CIS
SecurityNewsWire
MITRE
SANDS

Explanation: The MITRE Corporation maintains a list of


common vulnerabilities and exposures (CVE) used by
prominent security organizations.

15. As a Cybersecurity Analyst, it is very important to


keep current. It was suggested by some colleagues that
NewsBites contains many good current articles to read.
What network security organization maintains this weekly
digest?

MITRE
CIS
[Link] 11/36
11/4/24, 10:33 AM Cyber Threat Management (CyberTM) Course Final Exam Answers

SANDS
(ISC)2

Explanation: The SysAdmin, Audit, Network, Security


(SANS) Institute has many resources. One of them is
called NewsBites, the weekly digest of news articles
about computer security.

16. A network administrator is creating a network profile


to generate a network baseline. What is included in the
critical asset address space element?

the IP addresses or the logical location of essential


systems or data
the time between the establishment of a data flow and its
termination
the TCP and UDP daemons and ports that are allowed to
be open on the server
the list of TCP or UDP processes that are available to
accept data

Explanation: A network profile should include some


important elements, such as the following:
Total throughput – the amount of data passing from a
given source to a given destination in a given period of
time
Session duratio n – the time between the establishment
of a data flow and its termination
Ports used – a list of TCP or UDP processes that are
available to accept data
Critical asset address space – the IP addresses or the
logical location of essential systems or data

17. When a server profile for an organization is being


established, which element describes the TCP and UDP
daemons and ports that are allowed to be open on the
server?
[Link] 12/36
11/4/24, 10:33 AM Cyber Threat Management (CyberTM) Course Final Exam Answers

service accounts
listening ports
software environment
critical asset address space

Explanation: A server profile will often contain the


following:
* Listening ports – the TCP and UDP daemons and ports
that are allowed to be open on the server
* User accounts – the parameters defining user access
and behavior
* Service accounts – the definitions of the type of service
that an application is allowed to run on a server
* Software environment – the tasks, processes, and
applications that are permitted to run on the server

18. The IT security personnel of an organization notice


that the web server deployed in the DMZ is frequently
targeted by threat actors. The decision is made to
implement a patch management system to manage the
server. Which risk management strategy method is being
used to respond to the identified risk?

risk retention
risk sharing

[Link] 13/36
11/4/24, 10:33 AM Cyber Threat Management (CyberTM) Course Final Exam Answers

risk reduction
risk avoidance

Explanation: There are four potential strategies for


responding to risks that have been identified:
* Risk avoidance – Stop performing the activities that
create risk.
* Risk reduction – Decrease the risk by taking measures
to reduce vulnerability.
* Risk sharing – Shift some of the risk to other parties.
* Risk retention – Accept the risk and its consequences.

19. Which class of metric in the CVSS Base Metric Group


defines the features of the exploit such as the vector,
complexity, and user interaction required by the exploit?

Exploitability
Exploit Code Maturity
Impact
Modified Base

Explanation: The Base Metric Group of CVSS


represents the characteristics of a vulnerability that are
constant over time and across contexts. It contains two
classes of metrics:
* Exploitability metrics – features of the exploit such as
the vector, complexity, and user interaction required by
the exploit
* Impact metrics – the impacts of the exploit rooted in the
CIA triad of confidentiality, integrity, and availability

20. In what order are the steps in the vulnerability


management life cycle conducted?

discover, prioritize assets, assess, remediate, report,


verify

[Link] 14/36
11/4/24, 10:33 AM Cyber Threat Management (CyberTM) Course Final Exam Answers

discover, prioritize assets, assess, remediate, verify,


report
discover, assess, prioritize assets, report, remediate,
verify
discover, prioritize assets, assess, report, remediate,
verify

Explanation: There are six steps in the vulnerability


management life cycle:
– Discover
– Prioritize assets
– Assess
– Report
– Remediate
– Verify

21. An organization has implemented antivirus software.


What type of security control did the company
implement?

detective control
compensative control
deterrent control
recovery control

Explanation: A cybersecurity specialist must be aware of


the technologies and measures that are used as
countermeasures to protect the organization from threats
and vulnerabilities.

[Link] 15/36
11/4/24, 10:33 AM Cyber Threat Management (CyberTM) Course Final Exam Answers

22. What is the first step taken in risk assessment?

Identify threats and vulnerabilities and the matching


of threats with vulnerabilities.
Compare to any ongoing risk assessment as a means of
evaluating risk management effectiveness.
Establish a baseline to indicate risk before security
controls are implemented.
Perform audits to verify threats are eliminated.

Explanation: The three steps of risk assessment in


order are as follows:
– Identify threats and vulnerabilities and the matching of
threats with vulnerabilities.
– Establish a baseline to indicate risk before security
controls are implemented.
– Compare to an ongoing risk assessment as a means of
evaluating risk management effectiveness.

23. Match the stages in the risk management process to


the description.

[Link] 16/36
11/4/24, 10:33 AM Cyber Threat Management (CyberTM) Course Final Exam Answers

Explanation: Place the options in the following order:


Develop an action plan to reduce Respond
overall organization risk exposure. to the risk.
Management should rank and
prioritize threats and a team
determines how to respond to each
threat.

Once a risk has been identified, it is Assess


assessed and analyzed to determine the risk.
the severity that the threat poses.

Continuously review risk reductions Monitor


due to elimination, mitigation and the risk.
transfer actions.

Identify the threats throughout the Frame the


organization that increase risk. risk.

24. Your risk manager just distributed a chart that uses


three colors to identify the level of threat to key assets in
the information security systems. Red represents high
level of risk, yellow represents average level of threat and
green represents low level of threat. What type of risk
analysis does this chart represent?

[Link] 17/36
11/4/24, 10:33 AM Cyber Threat Management (CyberTM) Course Final Exam Answers

qualitative analysis
quantitative analysis
loss analysis
exposure factor analysis

Explanation: A qualitative or quantitative risk analysis is


used to identify and prioritize threats to the organization.

25. A company manages sensitive customer data for


multiple clients. The current authentication mechanism to
access the database is username and passphrase. The
company is reviewing the risk of employee credential
compromise that may lead to a data breach and decides
to take action to mitigate the risk before further actions
can be taken to eliminate the risk. Which action should
the company take for now?

Install fingerprint or retinal scanners.


Implement multi-factor authentication.
Purchase an insurance policy.
Enhance data encryption with an advanced algorithm.

Explanation: Risk management is the identification,


evaluation, and prioritization of risks. Organizations
manage risk in one of four ways, avoidance, mitigation,

[Link] 18/36
11/4/24, 10:33 AM Cyber Threat Management (CyberTM) Course Final Exam Answers

transfer, or accept. In this scenario, implementing multi-


factor authentication can reduce the risk of employee
credential compromise, which is a mitigation action.
Installing fingerprint or retinal scanners eliminates the
risk, which is avoidance. Purchasing an insurance policy
is transferring the financial risk to the insurance
company.

26. Match the security incident stakeholder with the role.

Cyber Threat Management (CyberTM) Course Final Exam


26

Explanation: Place the options in the following order:


performs disciplinary measures human resources

changes firewall rules information


assurance

preserves attack evidence IT support

designs the budget management

reviews policies for local or legal department


federal guideline violations

27. Why would threat actors prefer to use a zero-day


attack in the Cyber Kill Chain weaponization phase?

to launch a DoS attack toward the target

[Link] 19/36
11/4/24, 10:33 AM Cyber Threat Management (CyberTM) Course Final Exam Answers

to get a free malware package


to avoid detection by the target
to gain faster delivery of the attack on the target

Explanation: When a threat actor prepares a weapon for


an attack, the threat actor chooses an automated tool
(weaponizer) that can be deployed through discovered
vulnerabilities. Malware that will carry desired attacks is
then built into the tool as the payload. The weapon (tool
plus malware payload) will be delivered to the target
system. By using a zero-day weaponizer, the threat actor
hopes that the weapon will not be detected because it is
unknown to security professionals and detection
methods are not yet developed.

28. A threat actor has identified the potential vulnerability


of the web server of an organization and is building an
attack. What will the threat actor possibly do to build an
attack weapon?

Create a point of persistence by adding services.


Install a webshell on the web server for persistent
access.
Obtain an automated tool in order to deliver the
malware payload through the vulnerability.
Collect credentials of the web server developers and
administrators.

Explanation: One tactic of weaponization used by a


threat actor after the vulnerability is identified is to obtain
an automated tool to deliver the malware payload
through the vulnerability.

[Link] 20/36
11/4/24, 10:33 AM Cyber Threat Management (CyberTM) Course Final Exam Answers

Bring
techn
SBS's Digital Banking heart
busin
Guide releva
digita

29. According to NIST standards, which incident


response stakeholder is responsible for coordinating an
incident response with other stakeholders to minimize
the damage of an incident?

IT support
human resources
legal department
management

Explanation: The management team creates the


policies, designs the budget, and is in charge of staffing
all departments. Management is also responsible for
coordinating the incident response with other
stakeholders and minimizing the damage of an incident.

30. Which meta-feature element in the Diamond Model


describes information gained by the adversary?

resources
results
direction
methodology

Explanation: The meta-feature element results are used


to delineate what the adversary gained from the intrusion

[Link] 21/36
11/4/24, 10:33 AM Cyber Threat Management (CyberTM) Course Final Exam Answers

event.

31. The manager of a new data center requisitions


magnetic door locks. The locks will require employees to
swipe an ID card to open. Which type of security control
is being implemented?

corrective
compensative
preventive
recovery

Explanation: Preventive security controls prevent


unwanted or unauthorized activities from occurring
and/or apply restrictions to authorized users.

32. What is a statement of applicability (SOA)?

It stipulates total compliance with NIST.


It sets out a broad framework of network protocols used
and their implementations.
It allows for the tailoring of available control
objectives and controls to best meet its priorities
around confidentiality, integrity, and availability
It is used as an audit point for network device
implementation.

[Link] 22/36
11/4/24, 10:33 AM Cyber Threat Management (CyberTM) Course Final Exam Answers

33. An organization is developing a data governance


program that follows regulations and policies. Which role
in the program is responsible for ensuring compliance
with policies and procedures, assigning the proper
classification to information assets, and determining the
criteria for accessing information assets?

data controller
data custodian
data owner
data protection officer

34. A company is preparing for an ISMS audit. Match the


right control for each control objective.

35. Which step in the Vulnerability Management Life


Cycle performs inventory of all assets across the network
and identifies host details, including operating system
and open services?

Assess
Discover
Remediate
Prioritize assets

Explanation: The steps in the Vulnerability Management


Life Cycle include these:
Discover – inventory all assets across the network
and identify host details, including operating systems
and open services to identify vulnerabilities
Prioritize assets – categorize assets into groups or
business units, and assign a business value to asset
groups based on their criticality to business
operations

[Link] 23/36
11/4/24, 10:33 AM Cyber Threat Management (CyberTM) Course Final Exam Answers

Assess – determine a baseline risk profile to


eliminate risks based on asset criticality, vulnerability
threats, and asset classification
Report – measure the level of business risk
associated with your assets according to your
security policies. Document a security plan, monitor
suspicious activity, and describe known
vulnerabilities
Remediate – prioritize according to business risk
and fix vulnerabilities in order of risk
Verify – verify that threats have been eliminated
through follow-up audits

36. Which two classes of metrics are included in the


CVSS Base Metric Group? (Choose two.)

Confidentiality Requirement
Modified Base
Exploit Code Maturity
Exploitability
Impact metrics

Explanation: The Base Metric Group of CVSS


represents the characteristics of a vulnerability that are
constant over time and across contexts. It contains two
classes of metrics, Exploitability and Impact.

[Link] 24/36
11/4/24, 10:33 AM Cyber Threat Management (CyberTM) Course Final Exam Answers

37. Which type of evidence cannot prove an IT security


fact on its own?

best
corroborative
indirect
hearsay

Explanation: Indirect evidence cannot prove a fact on its


own, but direct evidence can. Corroborative evidence is
supporting information. Best evidence is most reliable
because it is something concrete such as a signed
contract.

38. What three tasks are accomplished by a


comprehensive security policy? (Choose three.)

useful for management


defines legal consequences of violations
is not legally binding
gives security staff the backing of management
vagueness
sets rules for expected behavior

Explanation: The security policy of an organization


accomplishes several tasks:

[Link] 25/36
11/4/24, 10:33 AM Cyber Threat Management (CyberTM) Course Final Exam Answers

It demonstrates the commitment to security by an


organization.
It sets the rules for expected behavior.
It ensures consistency in system operations, and
software and hardware acquisition use and
maintenance.
It defines the legal consequences of violations.
It gives security staff the backing of management.

39. To ensure that the chain of custody is maintained,


what three items should be logged about evidence that is
collected and analyzed after a security incident has
occurred? (Choose three.)

measures used to prevent an incident


time and date the evidence was collected
extent of the damage to resources and assets
vulnerabilities that were exploited in an attack
serial numbers and hostnames of devices used as
evidence
location of all evidence

Explanation: A chain of custody refers to the proper


accounting of evidence collected about an incident that is
used as part of an investigation. The chain of custody
should include the location of all evidence, the identifying
information of all evidence such as serial numbers and
hostnames, identifying information about all persons
handing the evidence, and the time and date that the
evidence was collected.

40. Which meta-feature element in the Diamond Model


classifies the general type of intrusion event?

phase
results
methodology

[Link] 26/36
11/4/24, 10:33 AM Cyber Threat Management (CyberTM) Course Final Exam Answers

direction

Explanation: Methodology – This is used to classify the


general type of event, such as port scan, phishing,
content delivery attack, syn flood, etc.

41. What key considerations does a business impact


analysis (BIA) examine? (Choose four.)

Recovery time objectives (RTOs)


Recovery point objectives (RPOs)
Recovery point times (RPTs)
Mean time between objectives (RBOs)
Mean time between failures (MTBF)
Mean time to repair (MTTR)

Explanation: Business continuity controls are more than


just backing up data and providing redundant hardware.
Creating a business continuity plan starts with carrying
out a business impact analysis (BIA) to identify critical
business processes, resources, and relationships
between systems. The BIA focuses on the consequences
of the interruption to critical business functions and
examines the key considerations listed here: RTOs,
RPOs, MTTR, and MTBF. The National Institute of
Standards and Technology (NIST) developed best
practices in relation to business continuity.

42. Which type of controls help uncover new potential


threats?

Preventive controls
Detective controls
Corrective controls

Explanation: Detective measures include controls that


discover unwanted events. These measures uncover

[Link] 27/36
11/4/24, 10:33 AM Cyber Threat Management (CyberTM) Course Final Exam Answers

new potential threats.

← Previous Article Next Article →


Checkpoint Exam: Incident 1.4.2 Governance and
Response Answers Compliance Quiz Answers

 Subscribe 

Join the discussion

{} [+] 

22 COMMENTS

Mark  1 year ago

A risk analyst conducts quantitative risk analysis and


determines that the SLE factor is $10,000 and the
ARO factor is 10%. What would be the ALE factor
given these values?

$150

$100

$1,000

$1,500
Reply

Mark  1 year ago

Why are honeypots positioned in the cloud?


[Link] 28/36
11/4/24, 10:33 AM Cyber Threat Management (CyberTM) Course Final Exam Answers

to isolate the honeypots from production networks

to have easier access to the honeypots

to create DMZ zones within the cloud

to have a faster solution to gather information


Reply

Mark  1 year ago

A cybersecurity analyst is testing a new vulnerability


scanner on a system. The analyst chooses to run an
intrusive credentialed scan. A few moments later, the
system that was running the scan crashed. What is
the most probable cause of the crash?

a hardware failure

the intrusive scan

a false positive

a false negative

Reply

Yeick  4 months ago

 Reply to Mark
The intrusive scan

Reply

Mark  1 year ago

An organization has experienced several data


breaches over the last five years. These data
breaches have cost the organization financially and
damaged its reputation. The organization has hired a
cybersecurity penetration team to perform a full
security audit on the entire organization. This
independent contractor conducted the audit and found
the following vulnerabilities:

[Link] 29/36
11/4/24, 10:33 AM Cyber Threat Management (CyberTM) Course Final Exam Answers

• Several user accounts allowed unauthorized and


escalated privileges.
• Systems and information without formal
authorization.
What two steps can the organization take to mitigate
these risks? (Choose two.)

terminate access and reset all passwords

adopt a no reuse of passwords on different


applications policy

log when elevated privileges are used

assign the least privilege to perform the given task

Reply

Pascal  1 year ago

Ethicsl hacker review please,?


Reply

aaaa  1 year ago

The manager of a new data center requisitions


magnetic door locks. The locks will require employees
to swipe an ID card to open. Which type of security
control is being implemented?

corrective
compensative
preventive
recovery

Reply

IT Administrator  1 year ago

 Reply to aaaa
Author
I added all your questions. Thank you for
sharing.

[Link] 30/36
11/4/24, 10:33 AM Cyber Threat Management (CyberTM) Course Final Exam Answers

Reply

aaaa  1 year ago

Which type of evidence cannot prove an IT security


fact on its own?

indirect
corroborative
hearsay
best

Reply

aaaa  1 year ago

What three tasks are accomplished by a


comprehensive security policy? (Choose three.)

sets rules for expected behavior


gives security staff the backing of management
defines legal consequences of violations
useful for management
is not legally binding
vagueness

Reply

aaaa  1 year ago

To ensure that the chain of custody is maintained,


what three items should be logged about evidence
that is collected and analyzed after a security incident
has occurred? (Choose three.)

measures used to prevent an incident


location of all evidence
vulnerabilities that were exploited in an attack
time and date the evidence was collected

[Link] 31/36
11/4/24, 10:33 AM Cyber Threat Management (CyberTM) Course Final Exam Answers

serial numbers and hostnames of devices used


as evidence
extent of the damage to resources and assets

Reply

aaaa  1 year ago

Which meta-feature element in the Diamond Model


classifies the general type of intrusion event?

methodology
phase
results
direction

Reply

aaaa  1 year ago

Which meta-feature element in the Diamond Model


classifies the general type of intrusion event?

methodology
phase
results
direction

Reply

aaaa  1 year ago

What key considerations does a business impact


analysis (BIA) examine?
Choose four correct answers

[Link] 32/36
11/4/24, 10:33 AM Cyber Threat Management (CyberTM) Course Final Exam Answers

Reply

aaaa  1 year ago

Which type of controls help uncover new potential


threats?

Preventive controls
Detective controls
Corrective controls

Reply

aaaa  1 year ago

What is a statement of applicability (SOA)?

It stipulates total compliance with NIST.


It sets out a broad framework of network protocols
used and their implementations.
It allows for the tailoring of available control
objectives and controls to best meet its
priorities around confidentiality, integrity, and
availability
It is used as an audit point for network device
implementation.

Reply

aaaa  1 year ago

[Link] 33/36
11/4/24, 10:33 AM Cyber Threat Management (CyberTM) Course Final Exam Answers

An organization is developing a data governance


program that follows regulations and policies. Which
role in the program is responsible for ensuring
compliance with policies and procedures, assigning
the proper classification to information assets, and
determining the criteria for accessing information
assets?

data controller
data custodian
data owner
data protection officer

Reply

aaaa  1 year ago

Which two classes of metrics are included in the


CVSS Base Metric Group? (Choose two.)

Confidentiality Requirement
Impact metrics
Modified Base
Exploitability
Exploit Code Maturity

Reply

aaaa  1 year ago

Which step in the Vulnerability Management Life


Cycle performs inventory of all assets across the
network and identifies host details, including operating
system and open services?

remediate
prioritize assets
assess
discover

[Link] 34/36
11/4/24, 10:33 AM Cyber Threat Management (CyberTM) Course Final Exam Answers

Reply

aaaa  1 year ago

What key considerations does a business impact


analysis (BIA) examine?

* the mean/average time between failures


* the mean/average time to repair an asset
* the average lifespan of an asset
* the maximum time the system/network/application
can be down

Reply

aaaa  1 year ago

A company is preparing for an ISMS audit. Match the


right control for each control objective.

Place the options in the following order:


A clean desk policy will be implemented.
To prevent loss, damage, theft or compromise of
sensitive data

Employees will be required to report any observed or


suspected information security weakness.
To ensure a consistent and effective approach to the
management of information security incidents

Rules regarding the installation of softwareby


employess will be established and implemented.
To prevent exploitation of software vulnerabilities

[Link] 35/36
11/4/24, 10:33 AM Cyber Threat Management (CyberTM) Course Final Exam Answers

Reply

ahmed  1 year ago

What is a statement of applicability (SOA)?


Reply

[Link] Copyright © 2024. Privacy Policy


Contact

[Link] 36/36

Common questions

Powered by AI

Zero-day attacks are valuable during the Cyber Kill Chain's weaponization phase because they exploit vulnerabilities that are not yet known to security professionals. This lack of awareness means that defensive measures have not been developed, allowing threat actors to bypass detection and deliver their attacks more effectively .

The CVSS Base Metric Group includes exploitability metrics and impact metrics. Exploitability metrics define characteristics of the exploit such as the vector, complexity, and user interaction required, which are crucial for understanding how easily an exploit can be deployed. Impact metrics relate to the consequences of an exploit and are based on the confidentiality, integrity, and availability triad, providing insight into the potential damage an exploit could cause .

To mitigate the risk of employee credential compromise, the company should implement multi-factor authentication. This action addresses the vulnerability by enhancing security measures beyond the existing username and passphrase method, reducing the likelihood of unauthorized access .

The steps in the vulnerability management life cycle include discovering vulnerabilities, prioritizing assets, assessing the vulnerabilities, reporting, remediating, and verifying mitigation efforts. The sequence is critical because correct initial discovery and prioritization ensure that resources are focused on the most critical vulnerabilities before proceeding to implement solutions and verifying their effectiveness .

The foundational steps in the risk assessment process include identifying threats and vulnerabilities, matching threats with vulnerabilities, establishing a baseline of risk before implementing controls, and comparing ongoing risk assessments to evaluate management effectiveness. These steps provide a structured approach to understanding the risks and developing appropriate mitigation strategies .

A qualitative risk analysis uses non-numerical categories to rank threats such as using a color-coded system (e.g., red for high risk, yellow for average risk, and green for low risk). In contrast, a quantitative risk analysis involves numerical data and calculations to measure risk exposure and impacts, allowing for more technical and detailed analysis .

A business impact analysis (BIA) is crucial in risk management as it assesses the potential consequences of disruptions to business operations. Key considerations include the maximum allowable downtime, impact on customer service, interdependencies between processes, and financial impact. This analysis enables organizations to prioritize recovery efforts and allocate resources effectively to minimize business interruptions .

A network profile should include key elements such as total throughput, session duration, ports used, and critical asset address space, which consists of the IP addresses or logical locations of essential systems or data .

The 'exploitability' metric plays a critical role in vulnerability assessment by defining how easily a vulnerability can be exploited, considering factors such as the attack vector, complexity, and user interaction required. A higher exploitability score indicates a higher potential for the vulnerability to be subdued, guiding prioritization in patch management and risk mitigation strategies .

Organizations can manage identified risks through four primary strategies: risk avoidance, where they cease activities that create the risk; risk reduction, which involves taking measures to lower vulnerability; risk sharing, which transfers some of the risk to other parties; and risk retention, where they accept the risk and its potential consequences .

You might also like