Package deal
FedVTE Bundled Exams with Complete Solution | Verified | Guaranteed Success
FedVTE Bundled Exams with Complete Solution | Verified | Guaranteed Success
[Show more]FedVTE Bundled Exams with Complete Solution | Verified | Guaranteed Success
[Show more]The most common security weaknesses and exploits are in which standardized list? - D. CVE - 
Common Vulnerabilities and Exposures 
Choose the password configuration rules enforced by the P Windows add-on. - C. Password 
must have a combination of upper case, lower case, numbers, and special characte...
Preview 2 out of 5 pages
Add to cartThe most common security weaknesses and exploits are in which standardized list? - D. CVE - 
Common Vulnerabilities and Exposures 
Choose the password configuration rules enforced by the P Windows add-on. - C. Password 
must have a combination of upper case, lower case, numbers, and special characte...
Which of the following is a common environmental reconnaissance task that is performed to help gain 
insight on how an organization's networked systems are connected, or mapping the network? - 
Topology Discovery 
If an unexpected issue occurred during an application installation on a Windows syste...
Preview 2 out of 6 pages
Add to cartWhich of the following is a common environmental reconnaissance task that is performed to help gain 
insight on how an organization's networked systems are connected, or mapping the network? - 
Topology Discovery 
If an unexpected issue occurred during an application installation on a Windows syste...
The acronym VPN stands for: - Virtual Private Network 
Executives are responsible for managing and overseeing enterprise risk management. - True 
The internal audit department is investigating a possible accounting breach. One of the auditors is sent 
to interview the following employees: Employee A...
Preview 1 out of 4 pages
Add to cartThe acronym VPN stands for: - Virtual Private Network 
Executives are responsible for managing and overseeing enterprise risk management. - True 
The internal audit department is investigating a possible accounting breach. One of the auditors is sent 
to interview the following employees: Employee A...
Mobile OS vulnerabilities are typically used to perform jailbreaking of devices. - True 
Windows Phone encrypts both apps and user content (e.g. pictures) on the SD card. - False 
Which of the following are attacks against Near Field Communications (NFC)? - All of the above 
What two components of a...
Preview 1 out of 2 pages
Add to cartMobile OS vulnerabilities are typically used to perform jailbreaking of devices. - True 
Windows Phone encrypts both apps and user content (e.g. pictures) on the SD card. - False 
Which of the following are attacks against Near Field Communications (NFC)? - All of the above 
What two components of a...
Which structured analytic technique aims to make analytic arguments, assumptions, or intelligence gaps 
more transparent? - diagnostic 
Which of the following is the first step in the intelligence cycle? - Planning and direction 
Self-driving cars, GPS networks, Apple watches, and satellites all hav...
Preview 1 out of 4 pages
Add to cartWhich structured analytic technique aims to make analytic arguments, assumptions, or intelligence gaps 
more transparent? - diagnostic 
Which of the following is the first step in the intelligence cycle? - Planning and direction 
Self-driving cars, GPS networks, Apple watches, and satellites all hav...
Which of the following can be determined by capturing and analyzing network traffic? 
A. Intent of Insider Threat actors and logs of their activity 
B. Communication and connections between hosts 
C. Open files and Registry handles on individual hosts 
D. Firewall and Intrusion Detection rules for t...
Preview 2 out of 14 pages
Add to cartWhich of the following can be determined by capturing and analyzing network traffic? 
A. Intent of Insider Threat actors and logs of their activity 
B. Communication and connections between hosts 
C. Open files and Registry handles on individual hosts 
D. Firewall and Intrusion Detection rules for t...
A logical Patch Management process is a one-time process that businesses should establish to ensure 
success. - False 
An API is a set of functions that an application can call to allow the application to operate within 
Windows. - True 
Authenticode is a means of code signing that allows users to v...
Preview 2 out of 5 pages
Add to cartA logical Patch Management process is a one-time process that businesses should establish to ensure 
success. - False 
An API is a set of functions that an application can call to allow the application to operate within 
Windows. - True 
Authenticode is a means of code signing that allows users to v...
Which of the following groups represents the most likely source of an asset loss through the 
inappropriate use of computers? 
A. Employees 
B. Hackers 
C. Visitors 
D. Customers - A. Employees 
FISMA charges which one of the following agencies with the responsibility of overseeing the security 
pol...
Preview 3 out of 23 pages
Add to cartWhich of the following groups represents the most likely source of an asset loss through the 
inappropriate use of computers? 
A. Employees 
B. Hackers 
C. Visitors 
D. Customers - A. Employees 
FISMA charges which one of the following agencies with the responsibility of overseeing the security 
pol...
Which of the following alternative operating systems is focused mostly on greater security in the event 
of a compromise by preventing propagation? - Qubes 
Which of the following might a malicious actor attempt to exploit in a social engineering attack? - All 
of the above 
Which of the following a...
Preview 1 out of 4 pages
Add to cartWhich of the following alternative operating systems is focused mostly on greater security in the event 
of a compromise by preventing propagation? - Qubes 
Which of the following might a malicious actor attempt to exploit in a social engineering attack? - All 
of the above 
Which of the following a...
2x sold
What program could you use on a Linux system to securely copy files to a Linux host running the SSH 
server daemon? - SCP 
Single user mode in Linux is a security risk if a malicious actor has physical access to the host - True 
srm is a tool used to securely delete files from the file system - True...
Preview 2 out of 5 pages
Add to cartWhat program could you use on a Linux system to securely copy files to a Linux host running the SSH 
server daemon? - SCP 
Single user mode in Linux is a security risk if a malicious actor has physical access to the host - True 
srm is a tool used to securely delete files from the file system - True...
The threat source is highly motivated and sufficiently capable and controls to prevent the vulnerability 
from being exercised are ineffective. Which likelihood rating does this describe? 
A. High 
B. Medium 
C. Low 
D. None of the above - A. High 
Kismet is different from a normal network sniffer s...
Preview 2 out of 11 pages
Add to cartThe threat source is highly motivated and sufficiently capable and controls to prevent the vulnerability 
from being exercised are ineffective. Which likelihood rating does this describe? 
A. High 
B. Medium 
C. Low 
D. None of the above - A. High 
Kismet is different from a normal network sniffer s...
A flaw in an online sporting goods website allows customers to purchase multiple quantities of goods 
and only be charged the single quantity price. To improve the site, management is demanding that the 
ecommerce application be tested to insure this flaw is corrected. Which of the following is the ...
Preview 2 out of 7 pages
Add to cartA flaw in an online sporting goods website allows customers to purchase multiple quantities of goods 
and only be charged the single quantity price. To improve the site, management is demanding that the 
ecommerce application be tested to insure this flaw is corrected. Which of the following is the ...
5x sold
Which type of attacker has actions that are considered noble by the attacker but could cause more harm 
than good? 
A. White Hat 
B. Black Hat 
C. Red Hat 
D. Gray Hat - D. Gray Hat 
During which step of Microsofts recommended Update Management Process would an update be 
tested? 
A. Assess 
B. Iden...
Preview 3 out of 19 pages
Add to cartWhich type of attacker has actions that are considered noble by the attacker but could cause more harm 
than good? 
A. White Hat 
B. Black Hat 
C. Red Hat 
D. Gray Hat - D. Gray Hat 
During which step of Microsofts recommended Update Management Process would an update be 
tested? 
A. Assess 
B. Iden...
Of the risk mitigation steps, in which step does management determine the most cost-effective control(s) 
for reducing risk to the organization's mission? - Step 4: Select Controls 
Which site is fully equipped, requiring only a short setup time due to restoring data backups and 
configurations? - ...
Preview 2 out of 5 pages
Add to cartOf the risk mitigation steps, in which step does management determine the most cost-effective control(s) 
for reducing risk to the organization's mission? - Step 4: Select Controls 
Which site is fully equipped, requiring only a short setup time due to restoring data backups and 
configurations? - ...
Ensuring that several individuals are able to perform a specific function in order to have oversight and 
eliminate single points of failure, is which of the following Operations Security principles? - C. 
Rotation of duties 
A standard ACL: - C. Identifies the source network to be blocked 
Which fo...
Preview 1 out of 3 pages
Add to cartEnsuring that several individuals are able to perform a specific function in order to have oversight and 
eliminate single points of failure, is which of the following Operations Security principles? - C. 
Rotation of duties 
A standard ACL: - C. Identifies the source network to be blocked 
Which fo...
Which DMZ component prevents incoming Internet traffic from accessing the internal network? - B. 
Router 
Which DNS component is a service running on a host system that requests resolution from a server? - 
B. DNS Client 
IPTables are described as which one of the following? - A. Used to design, mai...
Preview 1 out of 2 pages
Add to cartWhich DMZ component prevents incoming Internet traffic from accessing the internal network? - B. 
Router 
Which DNS component is a service running on a host system that requests resolution from a server? - 
B. DNS Client 
IPTables are described as which one of the following? - A. Used to design, mai...
Which of the following families of controls belong to the technical class of controls? - Identification 
and Authentication 
Which of the following is a management strategy for addressing risk? - Accept 
Cyber risk management solutions are typically done through which categories of security controls...
Preview 2 out of 5 pages
Add to cartWhich of the following families of controls belong to the technical class of controls? - Identification 
and Authentication 
Which of the following is a management strategy for addressing risk? - Accept 
Cyber risk management solutions are typically done through which categories of security controls...
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
You can quickly pay through EFT, credit card or Stuvia-credit for the summaries. There is no membership needed.
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Stuvia is a marketplace, so you are not buying this document from us, but from seller ClassHero. Stuvia facilitates payment to the seller.
No, you only buy this summary for R758,57. You're not tied to anything after your purchase.
4.6 stars on Google & Trustpilot (+1000 reviews)
79223 documents were sold in the last 30 days
Founded in 2010, the go-to place to buy summaries for 14 years now