QUESTION 46
-
Which of the following are the best examples of how anon-malicious person could negatively impact cybersecurity (choosethree)
Not immediately opening phishing emails
Not immediately deleting phishing emails
Misconfiguring a firewall
Working according to industry best practices
Keeping passwords in a text file on their desktop
9 points
QUESTION 49
-
Match each security related document to the best availabledescription
– A. B. C. D. Standards
– A. B. C. D. Guidelines
– A. B. C. D. Policies
– A. B. C. D. Procedures
A. Specifies what is acceptable in meeting a goal in a measurableway
B. A course of action or set of requirements that are recommendedto meet a goal
C. Specific instructions to be followed when carrying out tasksrelated to meeting a goal
D. High level statements that are laid out in fairly general termsfor how an organization will protect its systems over a period oftime
12 points
QUESTION 50
-
Why is a layered security approach important?
“Using more than one security component or technology means thatyou are familiar with them, ultimately increasing your employmentprospects in the cybersecurity field”
“Because no single security component or technology can protectagainst all threats, or be 100% effective against any singlethreat”
Because attackers are creative and look for any weakness thatcan possibly be exploited – Having more than one layer ofprotection decreases the chances of detecting or stopping anattack
Because security components that are 100% effective are veryexpensive – Layering less expensive components or technologies canbe more cost effective
3 points
QUESTION 51
-
Which security component separates a trusted network from anuntrusted network?
Firewall
Passive IDS
Active IDS
BrickWall
3 points
QUESTION 52
-
“True or False – Due to the potentially unlimited combinationsof actions that can be taken to harden system defenses, you are onyour own when determining recommended actions”
True
False
2 points
QUESTION 54
-
Which security component identifies suspicious traffic and maysent alerts to administrators?
Firewall
Passive IDS
Active IDS
BrickWall
3 points
QUESTION 55
-
VPNs and WPA2 are similar security technologies in that theyboth utilize
Encryption
Firewalls
Intrusion Detection
Digital Signatures
3 points
QUESTION 56
-
Hardening a system or network is essentially the process ofcarrying out these two tasks (choose two)
Reducing exposure
Influencing development
Implementing or improving protections
Categorizing threats
Freezing assets
Expert Answer
Answer to QUESTION 46 Which of the following are the best examples of how a non-malicious person could negatively impact cybersecu…