Quiz 1
.docx
keyboard_arrow_up
School
Lamar University *
*We aren’t endorsed by this school
Course
MISY-532
Subject
Computer Science
Date
Apr 3, 2024
Type
docx
Pages
6
Uploaded by minhaj90
Quiz 1
Test Content
1.
Question 1
1.25 Points
The ___structured_________________threat category contains threats that
are characterized by a greater amount of planning, a longer period of time to conduct the activity, more financial backing to accomplish it, and possibly corruption of, or collusion with, insiders.
structured
o
Blank 1
2.
Question 2
1.25 Points
Who is considered to be the ultimate insider, with his name being synonymous with the insider threat issue?
o
Robert Morris
o
Ean
o
sddward Snowden
o
Kevin Mitnick
o
Vladimir Levin
Ans : Edward Snoden
3.
Question 3
1.25 Points
Which Internet worm created infected systems that were part of what is known as a bot network (or botnet) and could be used to cause a DoS attack on a target or to forward spam e-mail to millions of users?
o
Slammer
o
Code Red
o
Ans: confiker
o
“ILOVEYOU”
o
An
4.
Question 4
1.25 Points
Which Internet criminal is famous for conducting his attacks using a number of different “tools” and techniques, including social engineering, sniffers, and cloned cellular telephones?
o
Robert Morris
o
Kevin Mitnick
o
Vladimir Levin
o
David Smith
o
Ans: kevin Mitnick
5.
Question 5
1.25 Points
How did the Code Red worm spread?
o
It exploited a buffer-overflow vulnerability in computers running Microsoft SQL Server or SQL Server Desktop Engine.
o
It collected key-strokes, screenshots, and network traffic from open ports.
o
It made use of a buffer-overflow condition in Microsoft’s IIS web servers that had been known for a month.
o
It entered through the victim’s Outlook address book software and then replicated itself by sending infected emails to the first 50 contacts.
o
Ans: It made use of a buffer-overflow condition in Microsoft’s IIS web servers that had been known for a month.
6.
Question 6
1.25 Points
_______Critical_____________ infrastructures are those whose loss would have severe repercussions on the nation.
Critical
o
Blank 1
7.
Question 7
1.25 Points
Which statement applies to viruses?
o
They typically are ahighly visible once released.
o
They are the best tool to use in highly structured attacks.
o
They are the best tool to use in attacks where secrecy is vital.
o
They are targeted at a specific organization.
Ans : They typically are highly visible once released.
o
8.
Question 8
1.25 Points
Which suspected nation-state malware platform poses interest because of its stealth, its complexity, and its ability to hide its command and control network from investigators?
o
Energetic Bear
o
The Dragonfly group
o
Regin
o
LulzSec
o
Ans: Regin
9.
Question 9
1.25 Points
Which term describes a category of attacks that generally are conducted over short periods of time (lasting at most a few months), involve a smaller number of individuals, have little financial backing, and are accomplished by insiders or outsiders who do not seek collusion with insiders?
o
Unstructured threat category
o
Structured threat category
o
Highly structured threat category
o
Critical infrastructure category
o
Ans: Unstructured threat category
10.
Question 10
1.25 Points
In 2014, on how many different threat actors, including criminals, hactivists, state-sponsored groups, and nation states, did CrowdStrike report?
o
19
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Related Questions
A threat agent____________
a. is limited to attacks using viruses and worms
b. does not include natural disasters
c. is something that cannot be determined in advance
d. is a person or entity with the power to carry out a threat against an asset
arrow_forward
By definition, a(n)________ is a person or thing that has the power to carry out a threat.
a. vulnerability
b. exploit
c. threat agent
d. risk
arrow_forward
Which of the following is not a category used in the ATT&CK matrix when profiling threat actors and activities?
Select one:
a. Location
b. Initial Access
C. Defense Evasion
d. Discovery
Which of the following refers to recovering resources from backup after a security incident?
Select one.
a. Reconstitution of Resources:
b. Restoration of Permissions
c. Restoration of Capabilities and Services
O d. Patching
Which option is a case management tool that offers built-in templates for specific types of investigations?
Select one:
a. EnCase Forensic
b. Susteen Secure view 4
c. Sysinternals
d. Intruder
arrow_forward
Which is the MOST important to enable a timely response to a security breach?
A. Knowledge sharing and collaboration
B. Security event logging
C. Roles and responsibilities
D. Forensic analysis
Correct Answer: B???? or C?????
______________________
Note
■ The official answer (could be incorrect because NO comes from ISACA!) is: "B. Security event logging".
■ Other experts claim that the correct answer is: "C. Roles and responsibilities".
■ This question, in my opinion, is unclear because:• B. Security event logging = is the correct answer if the context requested by the question is at an operational level, then SIEM, in this case, is very useful in fact thanks to SIEM the response to the incident at the operational level will be more efficient• C. Roles and responsibilities = is the correct answer if the context to which the question refers is the incident response plan (IRP), then it is evident that having an IRP that clarifies "who does what" (roles and responsibilities) then the…
arrow_forward
Which of the following is true regarding vulnerability appraisal?
a. Vulnerability appraisal is always the easiest and quickest step.
b. Every asset must be viewed in light of each threat.
c. Each threat could reveal multiple vulnerabilities.
d. Each vulnerability should be cataloged.
arrow_forward
Assume you are working at Yanbu Indutrial College as an IT Security Internee. Please list security risk for their IT resources and list appropriate mitigations. No handwritten answers and please put the answers on a table. Sample is given on the image.
Threat
Resources
Risk Level
(High/Medium/Low)
Mitigation Method
arrow_forward
Question 15
True or False: Separating the parking lot from the facilities building is a proactive security measure that
can minimize threats within the critical space.
O True
Select the appropriate response
False
Submit Response
arrow_forward
Q1
Is a conventional attack ever morally justified by an enemy cyberattack?
PLEASE ATTACH REFERENCE
arrow_forward
The computer lab of a local college needs a one-page document that it will distribute to its incoming students to increase their security awareness. After reading the information presented in this module and other sources, prepare a document, which should include a 10-item bullet list of the things that students must remember to reduce the risks of using information technology.
After reading the information presented in this module and other sources, write a one-page paper about three high-profile companies that faced security breaches in the last two years. Identify two vulnerabilities that enabled hackers to break into these companies’ systems.
Denial of service (DoS) is among the security threats that have been on the rise in recent years. After reading the information presented in this module and other sources, write a one-page paper that outlines four recommendations for dealing with this security threat. Cite three U.S. companies that have been among the victims of this security…
arrow_forward
Kathleen Patterson is the chief security officer for Vail Ski Resort, and she is faced with both physical and information security threats
every month. Since the resort implemented a new software system, they have been having a larger number of threats and breaches
of company information. Kathleen suspects that this may be caused by an internal employee. She needs to clarify and establish what
type of plan to help reduce further problems?
Multiple Choice
An information security plan
An ethical information policy
An antivirus plan
None of these
arrow_forward
In this activity, your challenge is to pick an IoT device. Research the vulnerabilities associated with the device . Once the student has chosen a IoT device and discovered the vulnerability associated with the device, they will do three par@graphs, detailing the vulnerability. must contain ways in which the vulnerability can be contained or mitigated.
cite in Apa style
arrow_forward
Susan is the lead investigator for a security incident and realizes that she will not be able to complete her investigation without causing severe disruption to the business. The action she feels she must take exceedsthe authority granted to her under the incident response plan. What should Susan do?
a)Shut down all business operations immediately until she develops a plan
b)Take the action immediately to protect the business
c)Discount the action as a possibility because it exceeds her authority
d)Consult with higher levels of management
arrow_forward
AcmeDesign Ltd is a small web company with nine employees. Each employee works from their company-owned laptop from their home, and all the company’s working files are stored using the cloud services provided by Microsoft. You have been tasked with undertaking the design and implementation of a security policy for the company.
i. Outline how you would approach the design and implementation of an appropriate security policy.
ii. Identify three assets that are held by the company, and provide a security risk analysis for two risks against each of the three assets
arrow_forward
Which statement best describes zero trust?
a. Zero trust can provide 100% protection against data breaches and ransomware
O b.
Zero trust is a new security framework that requires you to abandon all of your existing security controls and start from
scratch
c. Zero trust is not a product that you can buy; it is a set of principles that promotes the elimination of implicit trust in security
controls
d. Zero trust can be achieved by deploying a Zero Trust Network Access (ZTNA) solution
arrow_forward
Create a misuse-case diagram for a specific type of digital/computer-based attack. Be sure to explain the type of attack. Have at least 3 activities that are "allowed" and 2 activities that are considered misuse. Notate what each activity is.
arrow_forward
Scenario: As a member of the project team, you have to Exhibit responsibility within a team to build the Security Awareness and training presentation for the organizational users.Task:- Exhibit responsibility within a team and develop an Information Security Training - the importance of Security and Awareness training, - the importance of compliance with Legal, - Policies and security practices for the organizational employees.
arrow_forward
You are an entrepreneur looking to start a new online business. As part of registeringyour new venture and applying for small business funding, you are required to developand submit a cybersecurity risk management plan.
The purpose of such a plan is to demonstrate how you will protect your intellectualproperty and financial data, both to satisfy your bank and to create confidence for yourfuture clients. Your plan should be easy to understand, but also dynamic such that youcan adapt to changes within the business systems in the coming years.answer this:a) Describe the goals of the business and the focus of the risk assessment
arrow_forward
You are an entrepreneur looking to start a new online business. As part of registeringyour new venture and applying for small business funding, you are required to developand submit a cybersecurity risk management plan.
The purpose of such a plan is to demonstrate how you will protect your intellectualproperty and financial data, both to satisfy your bank and to create confidence for yourfuture clients. Your plan should be easy to understand, but also dynamic such that youcan adapt to changes within the business systems in the coming years.
a. Describe the goals of the business and the focus of the risk assessment
arrow_forward
You are an entrepreneur looking to start a new online business. As part of registeringyour new venture and applying for small business funding, you are required to developand submit a cybersecurity risk management plan.
The purpose of such a plan is to demonstrate how you will protect your intellectualproperty and financial data, both to satisfy your bank and to create confidence for yourfuture clients. Your plan should be easy to understand, but also dynamic such that youcan adapt to changes within the business systems in the coming years.
answer a) and b) :2. High level threat analysis
a. Identify all actors
b. Identify all information assets
arrow_forward
You are an entrepreneur looking to start a new online business. As part of registeringyour new venture and applying for small business funding, you are required to developand submit a cybersecurity risk management plan.
The purpose of such a plan is to demonstrate how you will protect your intellectualproperty and financial data, both to satisfy your bank and to create confidence for yourfuture clients. Your plan should be easy to understand, but also dynamic such that youcan adapt to changes within the business systems in the coming years.
What you have to answer:
a) describe the goals of the business and the focus of the risk assessment( make it short please) thank you
arrow_forward
Making Vulnerabilities Visible
Please provide 8 answers or more for above topic regarding question below.
The ethical challenges most relevant to this case
arrow_forward
You are asked to do some research, and write a report that answers the following questions about Digital Fingerprinting:
You should tackle the following points:
What is Digital Fingerprinting and for what purposes is it used?
How does the fingerprinting algorithm work? Describe its principle of operation.
Certain steps are followed to reach the desired result- either block, delete or authorize usage of content.
Some cybersecurity experts say that fingerprinting is abusive and exposes the privacy issues of users. Certain solutions were done by some browsers for blocking browser fingerprinting. Describe the measures taken by any of the browsers as a fingerprint defense mechanism.
List two common Fingerprinting Algorithms.
Report Writing:
You should follow the following guidelines while writing your report:
Your report should be between 400 and 500 words in length.
Ensure that your report has an appropriate structure and writing style.
Your report…
arrow_forward
- There are many types of cybersecurity liability policies covering a host of eventualities. What insurance you should buy depends on your business model and your company board's risk appetite. For this discussion, pick one of the five cybersecurity laws, regulations, or policies you wrote about in the Module 5 assignment, and discuss what types of insurance you would recommend in case your company fails at compliance for that requirement. Discuss the risk-reward trade offs, and explain why you think your insurance recommendation is worth the cost.
arrow_forward
SEE MORE QUESTIONS
Recommended textbooks for you
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Related Questions
- A threat agent____________ a. is limited to attacks using viruses and worms b. does not include natural disasters c. is something that cannot be determined in advance d. is a person or entity with the power to carry out a threat against an assetarrow_forwardBy definition, a(n)________ is a person or thing that has the power to carry out a threat. a. vulnerability b. exploit c. threat agent d. riskarrow_forwardWhich of the following is not a category used in the ATT&CK matrix when profiling threat actors and activities? Select one: a. Location b. Initial Access C. Defense Evasion d. Discovery Which of the following refers to recovering resources from backup after a security incident? Select one. a. Reconstitution of Resources: b. Restoration of Permissions c. Restoration of Capabilities and Services O d. Patching Which option is a case management tool that offers built-in templates for specific types of investigations? Select one: a. EnCase Forensic b. Susteen Secure view 4 c. Sysinternals d. Intruderarrow_forward
- Which is the MOST important to enable a timely response to a security breach? A. Knowledge sharing and collaboration B. Security event logging C. Roles and responsibilities D. Forensic analysis Correct Answer: B???? or C????? ______________________ Note ■ The official answer (could be incorrect because NO comes from ISACA!) is: "B. Security event logging". ■ Other experts claim that the correct answer is: "C. Roles and responsibilities". ■ This question, in my opinion, is unclear because:• B. Security event logging = is the correct answer if the context requested by the question is at an operational level, then SIEM, in this case, is very useful in fact thanks to SIEM the response to the incident at the operational level will be more efficient• C. Roles and responsibilities = is the correct answer if the context to which the question refers is the incident response plan (IRP), then it is evident that having an IRP that clarifies "who does what" (roles and responsibilities) then the…arrow_forwardWhich of the following is true regarding vulnerability appraisal? a. Vulnerability appraisal is always the easiest and quickest step. b. Every asset must be viewed in light of each threat. c. Each threat could reveal multiple vulnerabilities. d. Each vulnerability should be cataloged.arrow_forwardAssume you are working at Yanbu Indutrial College as an IT Security Internee. Please list security risk for their IT resources and list appropriate mitigations. No handwritten answers and please put the answers on a table. Sample is given on the image. Threat Resources Risk Level (High/Medium/Low) Mitigation Methodarrow_forward
- Question 15 True or False: Separating the parking lot from the facilities building is a proactive security measure that can minimize threats within the critical space. O True Select the appropriate response False Submit Responsearrow_forwardQ1 Is a conventional attack ever morally justified by an enemy cyberattack? PLEASE ATTACH REFERENCEarrow_forwardThe computer lab of a local college needs a one-page document that it will distribute to its incoming students to increase their security awareness. After reading the information presented in this module and other sources, prepare a document, which should include a 10-item bullet list of the things that students must remember to reduce the risks of using information technology. After reading the information presented in this module and other sources, write a one-page paper about three high-profile companies that faced security breaches in the last two years. Identify two vulnerabilities that enabled hackers to break into these companies’ systems. Denial of service (DoS) is among the security threats that have been on the rise in recent years. After reading the information presented in this module and other sources, write a one-page paper that outlines four recommendations for dealing with this security threat. Cite three U.S. companies that have been among the victims of this security…arrow_forward
- Kathleen Patterson is the chief security officer for Vail Ski Resort, and she is faced with both physical and information security threats every month. Since the resort implemented a new software system, they have been having a larger number of threats and breaches of company information. Kathleen suspects that this may be caused by an internal employee. She needs to clarify and establish what type of plan to help reduce further problems? Multiple Choice An information security plan An ethical information policy An antivirus plan None of thesearrow_forwardIn this activity, your challenge is to pick an IoT device. Research the vulnerabilities associated with the device . Once the student has chosen a IoT device and discovered the vulnerability associated with the device, they will do three par@graphs, detailing the vulnerability. must contain ways in which the vulnerability can be contained or mitigated. cite in Apa stylearrow_forwardSusan is the lead investigator for a security incident and realizes that she will not be able to complete her investigation without causing severe disruption to the business. The action she feels she must take exceedsthe authority granted to her under the incident response plan. What should Susan do? a)Shut down all business operations immediately until she develops a plan b)Take the action immediately to protect the business c)Discount the action as a possibility because it exceeds her authority d)Consult with higher levels of managementarrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,