ibm cybersecurity final exam 2023 questions and answers complete
14 views 0 purchase
Course
Ibm cybersecurity
Institution
Ibm Cybersecurity
ibm cybersecurity final exam 2023 questions and answers complete
which of these is the best definition of a security risk
the likelihood of a threat source exploiting a vulnerability
Fancy Bears and Anonymous are examples of what
Hacking organizations
which of the following defines a securit...
ibm cybersecurity final exam 2023 questions and answers complete which of these is the best definition of a security risk the likelihood of a threat source exploiting a vulnerability fancy bears and
Written for
Ibm cybersecurity
All documents for this subject (4)
Seller
Follow
magdamwikash23
Reviews received
Content preview
ibm cybersecurity final exam 2023 questions and answers
complete
which of these is the best definition of a security risk
the likelihood of a threat source exploiting a vulnerability
Fancy Bears and Anonymous are examples of what
Hacking organizations
which of the following defines a security threat
Any potential danger capable of exploiting a weaknesses in a system
implement a filter to remove flooded packets before they reach the host is a
countermeasure to which form of attack
a denial of service (DoS) attack
An email message that is encrypted, uses a digital signature and carries a hash value
would address which aspects of CIA Triad
Confidentiality and integrity
A company wants to prevent employees from wasting time on social media sites. to
accomplish this, a document forbidding use of these sites while at work is written and
circulated and then the firewalls are updated to block access to Facebook, Twitter and
other popular sites. which 2 types of security controls has the company just
implemented
Technical
Administrative
A penetration tester that gains access to a system without permission and then exploits
it for a personal gain is said to wear what color hat
black
Trying to break an encryption key by trying every possible combination of characters is
called what
A brute force attack
Which 3 of the following are key ITIL processes
Problem Management
Incident Management
Change Management
Which 3 roles are typically found in an information Security organization
Penetration Tester
Chief information Security Officer (CISO)
Vulnerability Assessor
ITIL is best described as what
A collection of IT Service Management best practices
Alice sends a message to Bob that is intercepted by Trudy. Which scenario describes
an integrity violation
Trudy changes the message and then forwards it on
In cybersecurity, Authenticity is defined as what
The property of being genuine and verifiable
Which type of access control is based upon the subjects clearance level and the objects
classification
, Mandatory Access Control (MAC)
The encryption and protocols used to prevent unauthorized access to data are
examples of which type of access control
Technical
A windows 10 user has 10 files exactly the same name. Which statement must be true
for these files
The Files must be in different directories
Which component of the Linux operating system interacts with your computers
hardware
The kernel
If cost is the primary concern, which type of cloud should be considered first
Public cloud
Which security concerns follow your workload even after it is successfully moved to the
cloud
(Data security, Disaster Recovery/Business Continuity Planning, Identity and Access
Management, Compliance)
All Of The Above
Which of the following is a self-regulating standard set up by the credit card industry in
the US
PCI-DSS
Which 2 of the following attack types target endpoints
Spear Phishing
Ad Network
If an endpoint Detection and Response (EDR) system detects that an endpoint does not
have a required patch installed, which statement best characterizes the actions it is able
to take automatically
The endpoint can be quarantined from all network resources except those that allow it
to download and install the missing patch
Granting access to a user account only those privileges necessary to perform its
intended functions is known as what
The principle of least privileges
The Windows Security App available in Windows 10 provides uses with which of the
following protections
(Virus and threat protection, Firewall and network protection, Family options - parental
controls)
All Of The Above
Symmetric key encryption by itself ensures which of the following
Confidentiality only
Which of the following practices helps assure the best results when implementing
encryption
Chose a reliable and proven published algorithm
Which of these methods ensures the authentication, non-repudiation and integrity of a
digital communication
Use of Hashing
Why is symmetric key encryption the most common choice of methods to encryptic data
at rest
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller magdamwikash23. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $10.29. You're not tied to anything after your purchase.