Mod 7 test

.docx

School

Colorado State University, Global Campus *

*We aren’t endorsed by this school

Course

415

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

6

Uploaded by BrigadierLoris3384

Report
u Certlfy 23FD-ITS415-1 (Based on Systems Security Certifid Practtioner (S5CP)] (5] l v Correct Social engineering attacks present a threat to organizations and individuals for all of the following reasons except which of the following? v A D Most targeted individuals and organizations have effective tools and procedures to filter out phishing and related scams, so they are now better protected from such attacks. B Most people want to be trusting and helpful. c Most targeted individuals don't see the harm in responding or in answering simple questions posed by the attacker. D Most people believe they are too smart to fall for such obvious ploys, but they do anyway. Explanation S Answer A is correct. Social engineering attacks are not a threat to organizations and individuals who have effective tools and procedures to filter out phishing and related scams. Options C, D, and B all demonstrate the hallmarks of social engineering attacks—they work (and have worked for thousands of years) because people are generally trusting, open, and willing to engage with strangers. Lesson Business Continuity via Information Security and People Power CIANA at Layer 8 and Above Exam Objectives 2. Security Operations and Administration 2.7. Participate in security awareness and training CRetry « Previous 10f10 Next » @ EndTest & uCertlfy 23FD-TS415-1 [Based on Systems Security Certfied Practitioner (5SCP) [ XO) l v Correct Which statement about planning and plans is correct? A Plans are more important than the planning process itself. B Plans are living documents and planning is non-iterative. v c D Planning should continuously bring plans and procedures in tune with ongoing operational reality. Explanation Answer C is correct. ITEM LIST Planning should be an ongoing, continuous, and iterative process; plans are thus continually tested against reality so that changes to plans and procedures stay harmonized. Option B s incorrect because plans are not living documents and planning is an iterative process. Option A s incorrect; plans are good, useful, and necessary, but it s the planning process that brings the team together to better understand needs versus resources. Business Continuity via Information Security and People Power Surviving to Operate: Plan for It! Exam Objectives 2. Security Operations and Administration 2.4. Participate in asset management < Rett & Previous 20f10 Next » @ Ei
ITEM LIST ITEM LIST uCertify uCertify : 23FD-ITS415-1 Based on Systems Security Certified Practitioner (SSCP)] g © @ l v Correct @ Which of the following types of actions or responses would you not expect to see in an information security incident response plan? A Engaging with senior organizational leadership v B D Relocation of business operations to alternate sites c Continually detect a potentially disruptive incident D Using off-site systems and data archives Explanation Answer B is correct. The relocation of business operations is typically part of disaster recovery plans. Option D, off-site systems and data archives may well be used in the restoration phase of an information security incident response. Options C and A are parts of incident response, continuity, and recovery planning. Business Continuity via Information Security and People Power Surviving to Operate: Plan for It! Exam Objectives 2. Security Operations and Administration 2.4. Participate in asset management & Previous 30f10 Next » @ En 23FD-ITS415-1 (33sed on Systems Security Certified Practitioner (SSCP)] Erd © @ | v correct Which value sets the maximum time lag or latency time for data to be considered useful for business operations? Explanation Answer B is correct. The recovery point objective (RPO) sets the maximum time lag or latency time for data to be considered useful for business operations. The recovery time objective (RTO) is the time by which the systems must be restored to normal operational functions after the occurrence of this risk event. The maximum allowable outage (MAO) is the greatest time period that business operations can be allowed to be disrupted by the risk event. The annual rate of occurrence (ARO) is the anticipated number of times per year that such an event may occur. Business Continuity via Information Security and People Power Cloud-Based “Do-Over” Buttons for Continuity, Security, and Resilience [ Exam Objectives | 3. Risk Identification, Monitoring, and Analysis 3.1. Understand the risk management process Previous 40f10 Next 3 @ EndTest &
uCertlfy 23FD-ITS415-1 (Based on Systems Securiy Certified Practitioner (SSCP) 00 I v Correct Which statement about phishing attacks is correct? v A D Phishing attacks of all kinds are still in use because they can be effective social engineering tools when trying to do reconnaissance or gain ilicit entry into an organization or its systems. B Phishing attacks are not social engineering attacks C Spear phishing attacks are easy to detect with scanners or filters. D Phishing attacks are rarely successful, and so they pose a very low risk to organizations. Explanation Answer A is correct. Phishing attacks of all kinds are still in use because they can be effective social engineering tools when trying to do reconnaissance or gain illicit entry into an organization or its systems. Option D is false; even if thousands of phishing emails are sent as part of a low-and-slow attack, one response can generate exploitable information for the attacker. Option B is false because the phishing attack is a social engineering attack. Option C is false; attackers work hard to mimic the style, format, expression, and construction of their phishing emails, and continually attempt to spoof email addresses, domain names, and so forth. Tools may filter a lot of such junk email for you, but they won't catch it all. Lesson | Business Continuity via Information Security and People Power CIANA at Layer 8 and Above Exam Objectives 2. Security Operations and Administration 2.7. Participate in security awareness and training us 50f10 Next » @ dTest 3 23FD-ITS415-1 Based on Systems Security Certified Practitioner (SSCP)] e © @ l v Correct uCertify In general, what differentiates phishing from whaling attacks? v A D Phishing attacks tend to be used to gain access to systems via malware payloads or by getting recipients to disclose information, whereas whaling attacks try to get responsible managers to authorize payments to the attacker's accounts. B Phishing attacks are focused on businesses, whereas whaling attacks can be aimed at anybody, anywhere. c Whaling attacks tend to offer something that ought to sound “too good to be true; whereas phishing attacks masquerade as routine business activities such as package delivery confirmations. D There's really no difference. Explanation ITEM LIST Answer A is correct. Phishing attacks tend to be used to gain access to systems via malware payloads or by getting recipients to disclose information, whereas whaling attacks try to get responsible managers to authorize payments to the attacker's accounts. Option B is incorrect; whaling is primarily aimed at senior business leaders, whereas phishing can be aimed at anybody, anywhere, i the attacker perceives there is something worthwhile to leam in doing so. Option C has these reversed; whaling attacks depend on the credibility of the business transaction they request. Option D is incorrect as there is a difference between these two attacks. Business Continuity via Information Security and People Power CIANA at Layer 8 and Above Exam Objectives 2. Security Operations and Administration 2.7. Participate in security awareness and training Retry & Previous 60f10 Next » @ E
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help