Certiport CyberSecurity Certification Questions with
Correct Answers
Diamond Model of Intrusion Analysis Correct Answer-Is an approach
employed by several information security professionals to authenticate
and track cyber threats. According to this, every incident can be depicted
as a diamond.
Adversary Correct Answer-An adversary is an organization or threat
actor responsible for leveraging a capability against a victim to fulfill its
goals.
Capability Correct Answer-Refers to the tools and techniques used by an
adversary in an event.
Infrastructure Correct Answer-Includes the physical or logical
communication structures such as IP or e-mail addresses, domain names,
and others, employed by an adversary to deliver a capability.
Victim Correct Answer-A target against whom attacks are initiated,
vulnerabilities are exploited, or capabilities are used. It can be
organizations, people, or assets, such as target email or IP addresses,
domains, and so on.wep
Reasons for Successful Attacks Correct Answer--Widespread
Vulnerabilities
-Configuration Issues
,-Poorly Designed Software
-Hardware Limitations
-Enterprise-Based Issues
Threat Actor Correct Answer-A person or element with power to carry
out a threat. An individual or entity responsible for cyber incidents
against the technology equipment or enterprises and users.
Information Security Correct Answer-The tasks of securing information
that is in a digital format:
- Manipulated by a microprocessor / In Processing
-Preserved on a storage device / At Rest
- Transmitted over a network / In Transmit
BYOD Correct Answer-Allows users to use their own personal mobile
devices for business purposes.
Corporate owned, personally enabled (COPE) Correct Answer-
Employees choose from a selection of company-approved devices.
Choose Your Own Device (CYOD) Correct Answer-Employees choose
from a limited selection of approved devices but the employee pays the
upfront cost of the device while the business owns the contract.
, Virtual Desktop Infrastructure (VDI) Correct Answer-Stores sensitive
applications and data on a remote server that is accessed through a
smartphone
Corporate-owned Correct Answer-Device is purchased and owned by
the enterprise
Common Vulnerabilities and Exposures (CVE) Correct Answer-A tool
that identifies vulnerabilities in operating systems and application
software. The CVE identifies vulnerabilities in operating systems and
application software.
Application Layer Correct Answer-The seventh layer of the OSI model.
Application layer protocols enable software programs to negotiate
formatting, procedural, security, synchronization, and other
requirements with the network. Protocols Consists of FTP, HTTP,
HTTPS, POP3, SMTP, IMAP. Device: Computer
Presentation Layer Correct Answer-The sixth layer of the OSI model.
Protocols in the Presentation layer translate between the application and
the network. Here, data are formatted in a schema that the network can
understand, with the format varying according to the type of network
used. The Presentation layer also manages data encryption and
decryption, such as the scrambling of system passwords. Protocols:
Compression, encryption
Session Layer Correct Answer-The fifth layer in the OSI model. This
layer establishes and maintains communication between two nodes on
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller cracker. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $13.49. You're not tied to anything after your purchase.