Mod 7 test
.docx
keyboard_arrow_up
School
Colorado State University, Global Campus *
*We aren’t endorsed by this school
Course
415
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
6
Uploaded by BrigadierLoris3384
u
Certlfy
23FD-ITS415-1
(Based
on
Systems
Security
Certifid
Practtioner
(S5CP)]
(5]
l
v
Correct
Social
engineering
attacks present
a
threat
to
organizations
and
individuals
for
all
of
the
following
reasons
except
which
of
the
following?
v
A
D
Most
targeted
individuals and
organizations
have
effective
tools
and
procedures
to
filter
out
phishing
and
related
scams,
so
they
are
now
better
protected from
such
attacks.
B
Most
people
want
to
be
trusting
and
helpful.
c
Most
targeted
individuals
don't
see
the
harm
in
responding
or
in
answering
simple
questions
posed
by
the
attacker.
D
Most
people
believe
they
are
too
smart
to
fall
for
such
obvious
ploys,
but
they
do
anyway.
Explanation
S
Answer
A
is
correct.
Social
engineering
attacks
are
not
a
threat
to
organizations
and
individuals
who
have
effective
tools
and
procedures
to
filter
out
phishing
and
related
scams.
Options
C,
D,
and
B
all
demonstrate
the
hallmarks
of
social
engineering
attacks—they
work
(and
have
worked
for
thousands
of
years)
because
people
are
generally
trusting,
open,
and
willing
to
engage
with
strangers.
Lesson
Business
Continuity
via
Information
Security
and
People
Power
CIANA
at
Layer
8
and
Above
Exam
Objectives
2.
Security
Operations
and
Administration
2.7.
Participate
in
security
awareness
and
training
CRetry
«
Previous
10f10
Next
»
@
EndTest
&
uCertlfy
23FD-TS415-1
[Based
on
Systems
Security Certfied
Practitioner
(5SCP)
[
XO)
l
v
Correct
Which
statement
about
planning
and plans
is
correct?
A
Plans
are
more
important
than
the
planning
process
itself.
B
Plans
are
living
documents
and
planning
is
non-iterative.
v
c
D
Planning should
continuously
bring
plans and
procedures
in
tune
with
ongoing
operational
reality.
Explanation
Answer
C
is
correct.
ITEM
LIST
Planning
should
be an
ongoing,
continuous,
and
iterative
process;
plans
are
thus
continually
tested
against
reality
so
that
changes
to
plans and
procedures
stay
harmonized.
Option
B
s
incorrect
because
plans
are
not
living
documents
and
planning
is
an
iterative
process.
Option
A
s
incorrect;
plans
are
good,
useful,
and
necessary,
but
it
s
the
planning
process
that
brings
the
team
together
to
better
understand
needs
versus resources.
Business
Continuity
via
Information
Security
and
People
Power
Surviving
to
Operate:
Plan
for
It!
Exam
Objectives
2.
Security
Operations
and
Administration
2.4.
Participate
in
asset
management
<
Rett
&
Previous
20f10
Next
»
@
Ei
ITEM
LIST
ITEM
LIST
uCertify
uCertify
:
23FD-ITS415-1
Based
on
Systems
Security
Certified
Practitioner
(SSCP)]
g
©
@
l
v
Correct
@
Which
of
the
following
types
of
actions
or
responses
would
you
not
expect
to
see
in
an
information
security incident
response
plan?
A
Engaging
with
senior
organizational
leadership
v
B
D
Relocation
of
business
operations
to
alternate
sites
c
Continually
detect
a
potentially
disruptive
incident
D
Using
off-site
systems
and
data
archives
Explanation
Answer
B
is
correct.
The
relocation
of
business
operations
is
typically
part
of
disaster
recovery
plans.
Option
D,
off-site
systems
and
data
archives
may
well
be
used
in
the
restoration
phase
of
an
information
security incident
response.
Options
C
and
A are
parts
of
incident
response,
continuity,
and
recovery
planning.
Business
Continuity
via
Information
Security
and
People
Power
Surviving
to
Operate:
Plan
for
It!
Exam
Objectives
2.
Security
Operations
and
Administration
2.4.
Participate
in
asset
management
&
Previous
30f10
Next
»
@
En
23FD-ITS415-1
(33sed
on
Systems
Security
Certified
Practitioner
(SSCP)]
Erd
©
@
|
v
correct
Which
value
sets
the
maximum
time
lag or
latency
time
for
data
to
be
considered
useful
for
business
operations?
Explanation
Answer
B
is
correct.
The recovery
point
objective
(RPO)
sets
the
maximum
time
lag
or
latency
time
for
data
to
be
considered
useful
for
business
operations.
The
recovery
time
objective
(RTO)
is
the
time
by
which
the
systems
must
be
restored
to
normal
operational functions
after
the
occurrence
of
this
risk
event.
The
maximum
allowable
outage
(MAO)
is
the
greatest
time
period
that
business
operations
can
be
allowed
to
be
disrupted
by
the
risk
event.
The annual
rate
of
occurrence
(ARO)
is
the
anticipated
number
of
times
per
year
that
such
an
event
may
occur.
Business
Continuity
via
Information
Security
and
People
Power
Cloud-Based
“Do-Over”
Buttons
for
Continuity,
Security,
and
Resilience
[
Exam
Objectives
|
3.
Risk
Identification,
Monitoring,
and
Analysis
3.1.
Understand
the
risk
management
process
&«
Previous
40f10
Next
3
@
EndTest
&
uCertlfy
23FD-ITS415-1
(Based
on
Systems
Securiy
Certified
Practitioner
(SSCP)
00
I
v
Correct
Which
statement
about phishing
attacks
is
correct?
v
A
D
Phishing
attacks
of
all
kinds
are
still
in
use
because
they
can
be
effective
social
engineering
tools
when
trying
to
do
reconnaissance
or
gain
ilicit
entry
into
an
organization
or
its
systems.
B
Phishing
attacks
are
not
social
engineering
attacks
C
Spear
phishing
attacks
are
easy
to
detect
with
scanners
or
filters.
D
Phishing
attacks
are
rarely
successful,
and
so
they
pose
a
very
low
risk
to
organizations.
Explanation
Answer
A
is
correct.
Phishing
attacks
of
all
kinds
are
still
in
use
because
they
can
be
effective
social
engineering
tools
when
trying
to
do
reconnaissance
or
gain
illicit
entry
into
an
organization
or
its
systems.
Option
D
is
false;
even
if
thousands
of
phishing
emails
are
sent
as
part
of
a
low-and-slow
attack,
one
response
can
generate
exploitable
information
for
the
attacker.
Option
B
is
false
because
the
phishing
attack
is
a
social
engineering
attack.
Option
C
is
false;
attackers
work
hard
to
mimic
the
style,
format,
expression,
and
construction
of
their
phishing
emails,
and
continually
attempt
to
spoof
email
addresses,
domain
names,
and
so
forth.
Tools
may
filter
a
lot
of
such
junk
email
for
you, but
they
won't
catch
it
all.
Lesson
|
Business
Continuity
via
Information
Security
and
People
Power
CIANA
at
Layer
8
and
Above
Exam
Objectives
2.
Security
Operations
and
Administration
2.7.
Participate
in
security
awareness
and
training
us
50f10
Next
»
@
dTest
3
23FD-ITS415-1
Based
on
Systems
Security
Certified
Practitioner
(SSCP)]
e
©
@
l
v
Correct
uCertify
In
general,
what
differentiates
phishing
from whaling
attacks?
v
A
D
Phishing
attacks
tend
to
be
used
to
gain
access
to
systems
via
malware
payloads
or
by
getting
recipients
to
disclose
information,
whereas
whaling
attacks
try
to
get
responsible
managers
to
authorize
payments
to
the
attacker's
accounts.
B
Phishing
attacks
are
focused
on
businesses,
whereas
whaling
attacks
can
be
aimed
at
anybody,
anywhere.
c
Whaling
attacks
tend
to
offer
something
that
ought
to
sound
“too
good
to
be
true;
whereas
phishing
attacks
masquerade
as
routine
business
activities
such
as
package
delivery
confirmations.
D
There's
really
no
difference.
Explanation
ITEM
LIST
Answer
A
is
correct.
Phishing
attacks
tend
to
be
used
to
gain
access
to
systems
via
malware
payloads
or
by
getting
recipients
to
disclose
information,
whereas
whaling
attacks
try
to
get
responsible
managers
to
authorize
payments
to
the
attacker's
accounts.
Option
B
is
incorrect;
whaling
is
primarily
aimed
at
senior
business
leaders,
whereas
phishing
can
be
aimed
at
anybody,
anywhere,
i
the
attacker
perceives
there
is
something
worthwhile
to
leam
in
doing
so.
Option
C
has
these
reversed;
whaling
attacks
depend
on
the
credibility
of
the
business
transaction
they
request.
Option
D
is
incorrect
as
there
is
a
difference
between
these
two
attacks.
Business
Continuity
via
Information
Security
and
People
Power
CIANA
at
Layer
8
and
Above
Exam
Objectives
2.
Security
Operations
and
Administration
2.7.
Participate
in
security
awareness
and
training
Retry
&
Previous
60f10
Next
»
@
E
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help