Verified
Which of the following techniques is NOT used to break the command and control (CnC) phase of the
Cyber Kill Chain®?
Select one:
(a) Vulnerability and Patch Management
(b) DNS sinkholing
(c) Blocking outbound traffic to known malicious sites and IP addresses
(d) DNS poisoning - vulnerability and patch management
Attacks that result in a Data Breach are most likely performed by internal threat actors (employees).
TRUE/FALSE - false
_____________ is described as an underlying network infrastructure that virtualizes physical computing
resources, data partitioning, scaling, security, backup. - PaaS (Platform as a Service)
An attacker only needs to successfully execute one step of the Cyber Kill Chain® to infiltrate a network,
whereas a defender must "be right every time" and break every step of the chain to prevent an attack.
TRUE/FALSE - false
Which of the following are examples of an 'endpoint'?
Select one or more:
(a) Chat Application
(b) Website
(c) Desktop
(d) Mainframe Server
(e) Point of Sale (Terminal)
(f) Mobile Phone - desktop, point of sale (terminal), mobile phone
, Botnets are commonly designed to be managed by a CnC - Command and Control - server. TRUE/FALSE -
true
A 'rootkit' is usually associated with which of the following:
(a) Escalation of Privilege
(b) Denial of service
(c) Christmas Tree Attack - escalation of privilege
Which of the following WLAN standards is the LEAST secure? Pick two.
Select one or more:
(a) WiFi Protected Setup (WPS)
(b) Wired Equivalent Privacy (WEP)
(c) Wireless Protected Access 2 (WPA2)
(d) Wireless Protected Access (WPA) - WPS (WiFi Protected Setup), WEP (Wireless Equivalent Privacy)
What would be the best description of 'polymorphism and metamorphism' ?
Select one:
(a) hiding techniques
(b) SPIM
(c) SPAM
(d) encryption algorithms - hiding techniques
The ability to withstand a catastrophic series of events is commonly known as _____________. - Fault
Tolerance
The terms 'ingress/egress' best match the following descriptions:
Select one:
(a) incoming / outgoing
(b) detection / prevention
(c) Patching / updating