100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CSX Cybersecurity Fundamentals: Practice Questions with 100% Correct Answers $13.24   Add to cart

Exam (elaborations)

CSX Cybersecurity Fundamentals: Practice Questions with 100% Correct Answers

 0 view  0 purchase
  • Course
  • CSX
  • Institution
  • CSX

CSX Cybersecurity Fundamentals: Practice Questions with 100% Correct Answers

Preview 3 out of 18  pages

  • September 10, 2024
  • 18
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CSX
  • CSX
avatar-seller
Examsplug
CSX Cybersecurity Fundamentals: Practice
Questions with 100% Correct Answers
-



Maintaining an asset inventory. - ✔✔Vulnerability management begins with an
understanding of cybersecurity assets and their locations, which can be accomplished by


Preparation, Detection and analysis, Investigation, Mitigation and recovery, Postincident
analysis - ✔✔Arrange the steps of the incident response process into the correct
order



Containment - ✔✔Which element of an incident response plan involves obtaining
and preserving evidence


Who had access to the evidence, in chronological order, Proof that the analysis is based
on copies identical to the original evidence, The procedures followed in working with
the evidence - ✔✔Select three. The chain of custody contains information regarding


"violation or imminent threat of violation of computer security policies, acceptable use
policies, or standard security practices." - ✔✔NIST defines a Threat as a


The estimated probability of the identified threats actually occurring, The efficiency and
effectiveness of existing risk mitigation controls, A list of potential vulnerabilities,
dangers and/or threats. - ✔✔Select all that apply. A business impact analysis (BIA)
should identify


is defined as "a model for enabling convenient, on-demand network access to a shared
pool of configurable resources (e.g., networks, servers, storage, applications and

,services) that can be rapidly provisioned and released with minimal management or
service provider interaction - ✔✔Cloud computing


APTs typically originate from sources such as organized crime groups, activists or
governments, APTs use obfuscation techniques that help them remain undiscovered for
months or even years, APTs are often long-term, multi-phase projects with a focus on
reconnaissance - ✔✔Select all that apply. Which of the following statements about
advanced persistent threats (APTs) are true?


The reorientation of technologies and services designed around the individual end user.
- ✔✔Smart devices, BYOD strategies and freely available applications and services are
all examples of:


- cloud computing
- social media

- mobile computing - ✔✔Which three elements of the current threat landscape have
provided increased levels of access and connectivity, and therefore increased
opportunities for cybercrime



Data Link - ✔✔To which of the following layers of the Open Systems Interconnect
(OSI) model would one map Ethernet?



Standards - ✔✔Which of the following interpret requirements and apply them to
specific situations?


Business needs - ✔✔Business continuity plans (BCPs) associated with organizational
information systems should be developed primarily on the basis of:



Consists of two or more security zones - ✔✔A segmented network

, Nonrepudiation - ✔✔Which cybersecurity principle is most important when
attempting to trace the source of malicious activity?



Wireless Protected Access 2 (WPA2) - ✔✔Which of the following offers the strongest
protection for wireless network traffic?



Core business functions - ✔✔Outsourcing poses the greatest risk to an organization
when it involves:



On a regular basis - ✔✔Risk assessments should be performed



Chain of custody - ✔✔Maintaining a high degree of confidence regarding the
integrity of evidence requires a(n):


Stateful - ✔✔A firewall that tracks open connection-oriented protocol sessions is said
to be:



Planning - ✔✔During which phase of the system development lifecycle (SDLC) should
security first be considered?



System-centric - ✔✔A cybersecurity architecture designed around the concept of a
perimeter is said to be:



Physical - ✔✔A passive network hub operates at which layer of the OSI model?



Homogeneous - ✔✔Updates in cloud-computing environments can be rolled out
quickly because the environment is:

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Examsplug. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $13.24. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

79064 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$13.24
  • (0)
  Add to cart