Filters
Question type

Study Flashcards

An example of the type of vulnerability exposed via traffic analysis occurs when an organization is trying to determine if all its device signatures have been adequately masked. _________________________

Correct Answer

verifed

verified

The ____________________ vulnerability assessment is designed to find and document vulnerabilities that may be present in the organization's public network.

Correct Answer

verifed

verified

The process of identifying and documenting specific and provable flaws in the organization's information asset environment is called vulnerability assessment (VA). _________________________

Correct Answer

verifed

verified

The target selection step of Internet vulnerability assessment involves using the external monitoring intelligence to configure a test engine (such as Nessus) for the tests to be performed.

Correct Answer

verifed

verified

An affidavit is sworn testimony that certain facts are in the possession of an investigating officer and that they warrant the examination of specific items located at a specific place.

Correct Answer

verifed

verified

chain of custody is the detailed documentation of the collection, storage, transfer, and ownership of evidence from the crime scene through its presentation in court. ___________

Correct Answer

verifed

verified

Digital forensics helps an organization understand what happened, and how, after an incident.

Correct Answer

verifed

verified

A process called __________ examines the traffic that flows through a system and its associated devices to identify the most frequently used devices.


A)  difference analysis
B)  traffic analysis 
C)  schema analysis
D)  data flow assessment

Correct Answer

verifed

verified

Why should agencies monitor the status of their programs

Correct Answer

verifed

verified

Agencies should monitor the status of th...

View Answer

The best method of remediation in most cases is to repair a vulnerability. _________________________

Correct Answer

verifed

verified

Intelligence for external monitoring can come from a number of sources: vendors, CERT organizations, public network sources, and membership sites.

Correct Answer

verifed

verified

The internal vulnerability assessment is usually performed against every device that is exposed to the Internet, using every possible penetration testing approach. _________________________

Correct Answer

verifed

verified

A(n) war game puts a subset of plans in place to create a realistic test environment. _________________________

Correct Answer

verifed

verified

The __________ mailing list includes announcements and discussion of a leading open-source IDPS.


A)  Nmap-hackers
B)  Packet Storm 
C)  Security Focus
D)  Snort

Correct Answer

verifed

verified

The final process in the vulnerability assessment and remediation domain is the exit phase. _________________________

Correct Answer

verifed

verified

The primary objective of the planning and ____________________ domain is to keep a lookout over the entire information security program.

Correct Answer

verifed

verified

CM assists in streamlining change management processes and prevents changes that could detrimentally affect the security posture of a system before they happen. _________________________

Correct Answer

verifed

verified

In digital forensics, all investigations follow the same basic methodology once permission for search and seizure has been obtained. Which of the following is NOT one of the elements of that process  


A)  Analyze the data without risking modification or unauthorized access.
B)  Report the findings to the proper authority. 
C)  Determine whether to "apprehend and prosecute."
D)  Identify relevant EM.

Correct Answer

verifed

verified

A performance ____________________ is an expected level of performance against which all subsequent levels of performance are compared.

Correct Answer

verifed

verified

__________ is used to respond to network change requests and network architectural design proposals.


A)  Network connectivity RA
B)  Dialed modem RA 
C)  Application RA
D)  Vulnerability RA

Correct Answer

verifed

verified

Showing 81 - 100 of 116

Related Exams

Show Answer