logo

Crowdly

Browser

Додати до Chrome

MAR-2-1

Шукаєте відповіді та рішення тестів для MAR-2-1? Перегляньте нашу велику колекцію перевірених відповідей для MAR-2-1 в moodle.epitest.eu.

Отримайте миттєвий доступ до точних відповідей та детальних пояснень для питань вашого курсу. Наша платформа, створена спільнотою, допомагає студентам досягати успіху!

Imagine that you’re helping your company develop new cybersecurity policies and procedures. In a meeting, you summarize famous cybersecurity case studies to demonstrate the need for various types of policies. One case study you summarize is the 2022 Cash App breach examined in this course.

What lesson should you highlight from this breach?

0%
40%
60%
0%
Переглянути це питання

A retail company hosts its own website and handles a significant volume of email traffic. The company is trying to protect internal sensitive data.

What setup would continue to provide website and email access without compromising the security of their internal network?

25%
0%
0%
75%
Переглянути це питання

Imagine that you’re a cybersecurity consultant hired by a local government organization. Script kiddies have targeted the organization recently, and the organization wants to safeguard itself for future attacks from this group.

What should you recommend that the organization do to protect itself from script kiddies?

0%
0%
0%
100%
Переглянути це питання

Imagine that ransomware infects your company’s servers.

What would the attacker likely demand for the restoration of your files?

0%
0%
75%
25%
Переглянути це питання

Anders leads the cybersecurity team for SecureNest Investments, a prominent national financial institution. He learns through threat intelligence that a hacktivist group might attack his organization in response to the CEO’s alleged support for a controversial political candidate. He plans to discuss the situation with company leadership and detail his plan for combatting this threat.

What is the most appropriate strategy for Anders to outline in his plan?

0%
0%
100%
0%
Переглянути це питання

Olimpia is a cybersecurity analyst at a medium-sized healthcare facility. She’s interested in using artificial intelligence (AI) to enhance her organization’s attack detection and defense. To bring AI to her workplace, first, she must discuss the technology’s benefits with her supervisor and explain how she would use it.

What is one way that Olimpia can use an AI system to improve attack detection at her organization?

33%
0%
0%
67%
Переглянути це питання

DataVista Technologies, a tech startup, has just experienced a malware attack that resulted in a data breach. The company hires Mustafa, a cybersecurity consultant, to investigate the attack and help prevent future ones like it. Mustafa decides to apply the Cyber Kill framework to better understand the attack and explain it to his client. He identifies events in the attack that correspond to the framework. The attacker probed the DataVista Technologies servers for vulnerabilities, chose the malware for the attack, and then sent the malware to some employees through email. In the fourth step of the Cyber Kill framework, the malware was activated.

Which of the following events in the attack corresponds to the Cyber Kill framework’s fourth step, exploitation?

0%
50%
0%
50%
Переглянути це питання

Rafael is a cybersecurity consultant. His client is a new startup company. He recommends that they set up multiple technical controls to protect systems and sensitive data. 

 Which of the following controls relates to the technology element of cybersecurity? 

0%
75%
0%
25%
Переглянути це питання

Sabine is an aspiring investigative journalist planning to publish a blog post examining a local politician. To aid her research, she plans to use an analyst tool that searches for links between the data sets that she compiles.

Which guideline for gathering open-source information will help Sabine’s analyst tool perform better?

17%
67%
0%
17%
Переглянути це питання

One rigorously debated topic in cybersecurity ethics is the concept of active defense. 

What is the ethical debate surrounding active defense in cybersecurity? 

100%
0%
0%
0%
Переглянути це питання

Хочете миттєвий доступ до всіх перевірених відповідей на moodle.epitest.eu?

Отримайте необмежений доступ до відповідей на екзаменаційні питання - встановіть розширення Crowdly зараз!

Browser

Додати до Chrome