(Solved) : Question 46 Following Best Examples Non Malicious Person Could Negatively Impact Cybersecu Q42737769 . . .

QUESTION 46

  1. Which of the following are the best examples of how anon-malicious person could negatively impact cybersecurity (choosethree)

    Not immediately opening phishing emails

    Not immediately deleting phishing emails

    Misconfiguring a firewall

    Working according to industry best practices

    Keeping passwords in a text file on their desktop

9 points   

QUESTION 49

  1. Match each security related document to the best availabledescription

          –       A.      B.       C.      D.   

    Standards

          –       A.      B.       C.      D.   

    Guidelines

          –       A.      B.       C.      D.   

    Policies

          –       A.      B.       C.      D.   

    Procedures

    A.

    Specifies what is acceptable in meeting a goal in a measurableway

    B.

    A course of action or set of requirements that are recommendedto meet a goal

    C.

    Specific instructions to be followed when carrying out tasksrelated to meeting a goal

    D.

    High level statements that are laid out in fairly general termsfor how an organization will protect its systems over a period oftime

12 points   

QUESTION 50

  1. Why is a layered security approach important?

    “Using more than one security component or technology means thatyou are familiar with them, ultimately increasing your employmentprospects in the cybersecurity field”

    “Because no single security component or technology can protectagainst all threats, or be 100% effective against any singlethreat”

    Because attackers are creative and look for any weakness thatcan possibly be exploited – Having more than one layer ofprotection decreases the chances of detecting or stopping anattack

    Because security components that are 100% effective are veryexpensive – Layering less expensive components or technologies canbe more cost effective

3 points   

QUESTION 51

  1. Which security component separates a trusted network from anuntrusted network?

    Firewall

    Passive IDS

    Active IDS

    BrickWall

3 points   

QUESTION 52

  1. “True or False – Due to the potentially unlimited combinationsof actions that can be taken to harden system defenses, you are onyour own when determining recommended actions”

    True

    False

2 points   

QUESTION 54

  1. Which security component identifies suspicious traffic and maysent alerts to administrators?

    Firewall

    Passive IDS

    Active IDS

    BrickWall

3 points   

QUESTION 55

  1. VPNs and WPA2 are similar security technologies in that theyboth utilize

    Encryption

    Firewalls

    Intrusion Detection

    Digital Signatures

3 points   

QUESTION 56

  1. Hardening a system or network is essentially the process ofcarrying out these two tasks (choose two)

    Reducing exposure

    Influencing development

    Implementing or improving protections

    Categorizing threats

    Freezing assets

Expert Answer


Answer to QUESTION 46 Which of the following are the best examples of how a non-malicious person could negatively impact cybersecu…

Leave a Comment

About

We are the best freelance writing portal. Looking for online writing, editing or proofreading jobs? We have plenty of writing assignments to handle.

Quick Links

Browse Solutions

Place Order

About Us