Vous êtes sur la page 1sur 13

AWR-169-W - Module 1 - Pre-Test

Points
17.00/20.00
Grade 85.00 out of 100.00

Question 1
Correct
1.00 points out of 1.00
Flag question

Question text
In 2014, which of the following type has the most cybercrime in
the sector of banking and finance?
Select one:
a. Identity theft
b. Customer Record Compromised
c. Financial fraud

d. Denial of Service Attacks

Question 2
Incorrect
0.00 points out of 1.00
Flag question
Question text
What is session hijacking?
Select one:
a. An attempt to trick a web user into entering personal
information
b. An attempt to make a computer system unavailable
c. An exploitation of a valid computer session through theft of
a cookie.
d. An exploitation of a computer session via social

engineering

Question 3
Correct
1.00 points out of 1.00
Flag question

Question text
What is eradication in cybersecurity?
Select one:
a. Completely removing the infecting agent or establishing
measures to make systems invulnerable to such an agent

b. Receiving, categorizing, and prioritizing of incident data


c. The restoration of normal operations
d. Determining the human perpetrator of an incident
Question 4
Correct
1.00 points out of 1.00
Flag question

Question text
A benefit to cybersecurity incident management would include
which one of the following?
Select one:
a. Responding to incidents in a systematic manner
b. Dealing with legal issues and preserving evidence
c. Using information gained to better prepare for future
incidents
d. All of the above

Question 5
Correct
1.00 points out of 1.00
Flag question

Question text
Which one of the following is a description of a Denial of
Service attack?
Select one:
a. An attempt to make a computer system unavailable
b. An exploitation of a computer session via theft of a magic
cookie
c. An attempt to compromise the on-line customer service
function of an organization
d. An attempt to turn a user's computer into a zombie

Question 6
Correct
1.00 points out of 1.00
Flag question

Question text
According to US-CERT, which one of the following is true about
cybersecurity incidents?
Select one:
a. Cybersecurity incidents include every type of event that
causes damage to information assets.
b. Cybersecurity incidents are only caused by intentional
human acts.
c. Cybersecurity incidents are often caused by unintentional
events such as natural disasters.
d. Cybersecurity incidents are acts violating an explicit or

implicit security policy.

Question 7
Correct
1.00 points out of 1.00
Flag question

Question text
During the protection phase of cybersecurity incident
management, one of the key activities is:
Select one:
a. Detection of events

b. Definition of services to be performed


c. Creation of incident policies
d. Specification of procedures

Question 8
Incorrect
0.00 points out of 1.00
Flag question

Question text
Which one of the following is part of the preparation phase of
cyber incident management?
Select one:
a. Policy creation
b. Eradication techniques
c. Escalation methods
d. Detection methods

Question 9
Incorrect
0.00 points out of 1.00
Flag question

Question text
What is cyber incident recovery?
Select one:
a. Receiving, categorizing, and prioritizing of incident data
b. The restoration of normal operations
c. Taking measures to limit the damage caused by an incident
d. All of the above

Question 10
Correct
1.00 points out of 1.00
Flag question

Question text
The NIST SP 800-61 standard describes:
Select one:
a. A comprehensive set of business practices for information
security
b. Structure and guidelines in regard to forming and operating
computer security response teams
c. How organizations should monitor and detect cyber events
d. An organization's procedure in regard to the effective

handling of cybersecurity incidents

Question 11
Correct
1.00 points out of 1.00
Flag question

Question text
Why are preventative measures alone insufficient for effective
cybersecurity?
Select one:
a. Preventative measures are based upon risk analysis of past
events.
b. Some types of attacks cannot be prevented.
c. New types of attacks are constantly being developed.
d. All of the above

Question 12
Correct
1.00 points out of 1.00
Flag question

Question text
Information availability is compromised when authorized users
cannot get proper ________ information in the customary and
usable manner.
Select one:
a. Write permission to
b. Access to

c. Credentials of
d. All of the above

Question 13
Correct
1.00 points out of 1.00
Flag question

Question text
ISO is:
Select one:
a. A non-regulatory agency within the U.S. Department of
Commerce
b. An international standard setting body
c. Part of the NCSD of the U.S. DHS
d. An organization created by DARPA at CMU

Question 14
Correct
1.00 points out of 1.00
Flag question

Question text
Which one of the following is NOT a benefit to cyber security
incident management?
Select one:
a. Dealing with legal issues and preserving evidence
b. Responding to incidents in a systematic manner
c. Using information gained to better prepare for future
incidents
d. Declassifying evidence as quickly as possible

Question 15
Correct
1.00 points out of 1.00
Flag question

Question text
Which one of the following is NOT a key activity in the
protection phase of cyber incident management?
Select one:
a. Detection of events
b. Definition of services to be performed

c. Identification of root causes


d. All of the above

Question 16
Correct
1.00 points out of 1.00
Flag question

Question text
Which one of the following is a type of malware (malicious
software)?
Select one:
a. Worms

b. Denial of Service
c. Zero-day
d. None of the above

Question 17
Correct
1.00 points out of 1.00
Flag question

Question text
One of the key activities during the protection phase of
cybersecurity incident management is:
Select one:
a. Definition of services to be performed
b. Detection of events

c. Creation of incident policies


d. Specification of procedures

Question 18
Correct
1.00 points out of 1.00
Flag question

Question text
The preparation phase of cybersecurity incident management
involves the creation of:
Select one:
a. Policies
b. Services
c. Procedures
d. All of the above

Question 19
Correct
1.00 points out of 1.00
Flag question

Question text
SQL injections are caused by:
Select one:
a. Lack of HTML form field validation

b. Running macros that are downloaded


c. Opening e-mail attachments
d. Code injected via backdoors

Question 20
Correct
1.00 points out of 1.00
Flag question

Question text
What is a rootkit?
Select one:
a. A computer that has been compromised by a hacker or
computer virus
b. Software module that run automated tasks over the Internet
c. Software designed to take fundamental control of a
computer

d. All of the above

Vous aimerez peut-être aussi