logo

Crowdly

MAR-2-1

Looking for MAR-2-1 test answers and solutions? Browse our comprehensive collection of verified answers for MAR-2-1 at moodle.epitest.eu.

Get instant access to accurate answers and detailed explanations for your course questions. Our community-driven platform helps students succeed!

Your organization has just suffered a data breach. Your supervisor is concerned about the potential cost of the breach and asks you to list the biggest contributors to a breach’s cost.

What should you list as the most significant contributor to the cost of a data breach?

0%
100%
0%
0%
View this question
Olimpia is a cybersecurity analyst at a medium-sized healthcare facility. She’s interested in using artificial intelligence (AI) to enhance her organization’s attack detection and defense. To bring AI to her workplace, first, she must discuss the technology’s benefits with her supervisor and explain how she would use it.

What is one way that Olimpia can use an AI system to improve attack detection at her organization?

0%
0%
0%
0%
View this question
Which of the following is a common approach that organizations use to detect cyber attacks?
0%
0%
100%
0%
View this question
Imagine that you’re helping your company develop new cybersecurity policies and procedures. In a meeting, you summarize famous cybersecurity case studies to demonstrate the need for various types of policies. One case study you summarize is the 2022 Cash App breach examined in this course.

What lesson should you highlight from this breach?

100%
0%
0%
0%
View this question
Rhonda is a cybersecurity professional for a major tech company. One day, she receives an alert indicating that someone or something has gained unauthorized access to the company’s system. Rhonda investigates the event and determines that the intruder is a cyberattacker. Rhonda wants to stay ahead and prevent any further intrusion by the cyberattacker.

Which of the following resources can help Rhonda identify and respond to cyberthreats the attacker might have used?

0%
0%
0%
100%
View this question
Which of the following statements is correct about the social engineering tactics that attackers use?
0%
0%
0%
0%
View this question
DataVista Technologies, a tech startup, has just experienced a malware attack that resulted in a data breach. The company hires Mustafa, a cybersecurity consultant, to investigate the attack and help prevent future ones like it. Mustafa decides to apply the Cyber Kill framework to better understand the attack and explain it to his client. He identifies events in the attack that correspond to the framework.

The attacker probed the DataVista Technologies servers for vulnerabilities, chose the malware for the attack, and then sent the malware to some employees through email. In the fourth step of the Cyber Kill framework, the malware was activated.

Which of the following events in the attack corresponds to the Cyber Kill framework’s fourth step, exploitation?

100%
0%
0%
0%
View this question
Which cybersecurity job role is responsible for determining if a reported alert is an organizational attack, scoping out the extent of the cybersecurity incident, planning the best remediation methods, and implementing the remediation with appropriate teams in a timely manner?
0%
0%
0%
100%
View this question
Information security’s objectives are often defined using the CIA triad. CIA is a mnemonic for the three objectives. What are they?
0%
0%
0%
0%
View this question
Which of the following is NOT one of the three key elements of cybersecurity?
0%
0%
0%
100%
View this question

Want instant access to all verified answers on moodle.epitest.eu?

Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!