100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CDS Final Exam Questions With 100% Verified Answers $10.49   Add to cart

Exam (elaborations)

CDS Final Exam Questions With 100% Verified Answers

 0 view  0 purchase
  • Course
  • CDS
  • Institution
  • CDS

CDS Final Exam Questions With 100% Verified Answers A series of steps that follow the stages of a cyberattack from early reconnaissance to the exfiltration of data is known as the ____. - answercyber kill chain ________ is used to maintain awareness of evolving threats in general and is a resou...

[Show more]

Preview 2 out of 10  pages

  • October 16, 2024
  • 10
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CDS
  • CDS
avatar-seller
sirjoel
©SIRJOEL EXAM SOLUTIONS
11/3/2024 10:54 PM



CDS Final Exam Questions With 100%
Verified Answers


A series of steps that follow the stages of a cyberattack from early reconnaissance to the
exfiltration of data is known as the ____. - answer✔cyber kill chain
________ is used to maintain awareness of evolving threats in general and is a resource for
researching specific threats as an organization develops usable threat intelligence - answer✔open
source intelligence
if an intruder can _____ a device, then no electronic protection can deter the loss of information -
answer✔physically access

which of the following is not a definite indicator of an incident - answer✔presence of unfamiliar
files
the failure of a technical control to react to the intended stimulus so that it goes unreported is
called a___________ - answer✔false negative
one of the more commonly seen and most easily avoided incidents is the _______ attack, where
employees are bombarded with numerous attempts to convince them to activate a link embedded
in an email or respond to a request for communications with an unknown outside party, often
masquerading as a known entity - answer✔phishing
the use of email in fraudulent efforts to compromise the organization is known as ______ -
answer✔business email compromise
a decoy application or systems simulation that attempt to draw attackers to it and away from
actual production systems is known as a ________ - answer✔honeypot
_______ is the organized research and investigation of internet addresses owned or controlled by
a target organization - answer✔footprinting
the theft of organizational data, either physically or by extraction through the owners networks is
called data _________ - answer✔exfiltration

, ©SIRJOEL EXAM SOLUTIONS
11/3/2024 10:54 PM


in the event that a definite indicator is recognized, the corresponding ______ must be activated
immediately - answer✔IR plan
a staffed control room where key security technologies, networks, and critical systems are
monitored for incidents is known as _____________ - answer✔security operations center
Passive Scanning is the process of collecting information about computers by sending traffic and
observing what traffic returns as a result.

t or f - answer✔False
The Windows Task Manager can be used to review all processes on microsoft windows
computers.

t or f - answer✔false
an incident candidate is an adverse event that is a possible incident.

t or f - answer✔true
malware includes viruses, worms, trojan horses, and an entire library of malicious scripts
designed to steal information, deny service to needed resources, and generally wreak havoc in
the organization.

t or f - answer✔true
the msot common detection of a denial-of-service attack is a message to a user that they have
been locked out of their computer system, and that their files and data have been encrypted.

t or f - answer✔false
software designed to penetrate security controls, identitfy valuable content, and then encrypt files
and data in order to extort payment for the key needed to unlock the encryption is known as
blackmail.

t or f - answer✔false `
one engages in open source ______________ when information is collected for analysis from
publicly available sources - answer✔intelligence
like the wiretap acts prohibition on intercepting the contents of communication, the _______
creates a general prohibition on the real time monitoring of traffic data relating to
communications - answer✔pen/trap statute

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller sirjoel. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $10.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

82956 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$10.49
  • (0)
  Add to cart