- Question 1
1 out of 1 points
It’s essential to match your organization’s required __________ with its security structure.
Answer
| |||||
- Question 2
0 out of 1 points
________ provides information on what is happening as it happens.
Answer
| |||||
- Question 3
0 out of 1 points
Which of the following is the definition of anomaly-based IDS?
Answer
| |||||
- Question 4
1 out of 1 points
Audits also often look at the current configuration of a system as a snapshot in time to verify that it complies with ________.
Answer
| |||||
- Question 5
0 out of 1 points
A method of security testing that isn’t based directly on knowledge of a program’s architecture is the definition of ________.
Answer
| |||||
| |||||
0 out of 1 points
Which of the following is the definition of white-box testing?
Answer
| |||||
- Question 7
1 out of 1 points
As your organization evolves and as threats mature, it is important to make sure your __________ still meet(s) the risks you face today.
Answer
| |||||
- Question 8
0 out of 1 points
Security audits help ensure that your rules and __________ are up to date, documented, and subject to change control procedures.
Answer
| |||||
- Question 9
0 out of 1 points
What is a Security Information and Event Management (SIEM) system?
Answer
| |||||
- Question 10
0 out of 1 points
What is meant by gray-box testing?
Answer
| |||||
- Question 11
0 out of 1 points
Which of the following is the definition of false negative?
Answer
| |||||
- Question 12
0 out of 1 points
Which of the following defines network mapping?
Answer
| |||||
- Question 13
0 out of 1 points
Which of the following is the definition of pattern-based IDS?
Answer
| |||||
- Question 14
0 out of 1 points
________ gives you the opportunity to review your risk-management program and to confirm that the program has correctly identified and reduced (or otherwise addressed) the risks to your organization.
Answer
| |||||
- Question 15
0 out of 1 points
What term is used to describe a reconnaissance technique that enables an attacker to use port mapping to learn which operating system and version are running on a computer?
Answer
| |||||||
- Question 16
1 out of 1 points
SOC 2 and SOC 3 reports both address primarily ________-related controls.
Answer
| |||||
- Question 17
0 out of 1 points
If knowing about an audit changes user behavior, an audit will ____________.
Answer
| |||||
- Question 18
0 out of 1 points
Audits are necessary because of ________.
Answer
| |||||
- Question 19
0 out of 1 points
Which of the following is the definition of hardened configuration?
Answer
| ||||
- Question 20
0 out of 1 points
One of the best ways to avoid wasting your organization’s resources is to ensure that you follow the ________ review cycle.
Answer
| ||||

Комментариев нет:
Отправить комментарий