100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CDS Final UPDATED Actual Exam Questions and CORRECT Answers $9.49   Add to cart

Exam (elaborations)

CDS Final UPDATED Actual Exam Questions and CORRECT Answers

 2 views  0 purchase
  • Course
  • CDS
  • Institution
  • CDS

CDS Final UPDATED Actual Exam Questions and CORRECT Answers A series of steps that follow the stages of a cyberattack from early reconnaissance to the exfiltration of data is known as the ____. - CORRECT ANSWER- cyber kill chain ________ is used to maintain awareness of evolving threats in ge...

[Show more]

Preview 2 out of 13  pages

  • September 22, 2024
  • 13
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CDS
  • CDS
avatar-seller
MGRADES
CDS Final UPDATED Actual Exam
Questions and CORRECT Answers
A series of steps that follow the stages of a cyberattack from early reconnaissance to the
exfiltration of data is known as the ____. - CORRECT ANSWER- ✔✔cyber kill chain


________ is used to maintain awareness of evolving threats in general and is a resource for
researching specific threats as an organization develops usable threat intelligence -
CORRECT ANSWER- ✔✔open source intelligence


if an intruder can _____ a device, then no electronic protection can deter the loss of
information - CORRECT ANSWER- ✔✔physically access


which of the following is not a definite indicator of an incident - CORRECT ANSWER-
✔✔presence of unfamiliar files


the failure of a technical control to react to the intended stimulus so that it goes unreported is
called a___________ - CORRECT ANSWER- ✔✔false negative


one of the more commonly seen and most easily avoided incidents is the _______ attack,
where employees are bombarded with numerous attempts to convince them to activate a link
embedded in an email or respond to a request for communications with an unknown outside
party, often masquerading as a known entity - CORRECT ANSWER- ✔✔phishing


the use of email in fraudulent efforts to compromise the organization is known as ______ -
CORRECT ANSWER- ✔✔business email compromise


a decoy application or systems simulation that attempt to draw attackers to it and away from
actual production systems is known as a ________ - CORRECT ANSWER- ✔✔honeypot


_______ is the organized research and investigation of internet addresses owned or controlled
by a target organization - CORRECT ANSWER- ✔✔footprinting

, the theft of organizational data, either physically or by extraction through the owners
networks is called data _________ - CORRECT ANSWER- ✔✔exfiltration


in the event that a definite indicator is recognized, the corresponding ______ must be
activated immediately - CORRECT ANSWER- ✔✔IR plan


a staffed control room where key security technologies, networks, and critical systems are
monitored for incidents is known as _____________ - CORRECT ANSWER- ✔✔security
operations center


Passive Scanning is the process of collecting information about computers by sending traffic
and observing what traffic returns as a result.

t or f - CORRECT ANSWER- ✔✔False


The Windows Task Manager can be used to review all processes on microsoft windows
computers.

t or f - CORRECT ANSWER- ✔✔false


an incident candidate is an adverse event that is a possible incident.

t or f - CORRECT ANSWER- ✔✔true


malware includes viruses, worms, trojan horses, and an entire library of malicious scripts
designed to steal information, deny service to needed resources, and generally wreak havoc in
the organization.

t or f - CORRECT ANSWER- ✔✔true


the msot common detection of a denial-of-service attack is a message to a user that they have
been locked out of their computer system, and that their files and data have been encrypted.

t or f - CORRECT ANSWER- ✔✔false


software designed to penetrate security controls, identitfy valuable content, and then encrypt
files and data in order to extort payment for the key needed to unlock the encryption is known
as blackmail.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller MGRADES. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $9.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75759 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$9.49
  • (0)
  Add to cart