security exam

Is this your test? Login to manage it. If not, you can create an exam just like it.

This is a non-interactive preview of the quiz content.

1.
1 point
Which of these CSIRT services is a proactive service?
2.
1 point
In what phase in the intrusion kill chain model is antivirus a useful course of action?
3.
2 points
What type of IDPS makes use of a clipping level?
4.
2 points
Which backup technique yield the shortest elapsed time needed to restore files?
5.
2 points
Which of these actions is NOT a containment, eradication or recovery action?
6.
2 points
Which of these protocols are commonly misused in reflective DDoS attacks?
7.
1 point
What is an example of an atomic indicator?


8.
2 points
In what phase in the intrusion kill chain model is data execution prevention (DEP) a useful course of action?
9.
2 points
Which of these tools is NOT a NIDPS?
10.
1 point
What type of IDPS makes use of a clipping level?
11.
2 points
Which of these is an example of a smoldering crisis?
12.
2 points
Which of these statements is NOT correct?
13.
2 points
What is the main difference between Risk Management and Business Continuity Management (BCM)?
14.
2 points
Which of these tools is used for sharing of indicators between CSIRTs?
15.
2 points
Which of these is NOT a normal Windows process, and could indicate a malicious process running on a computer?
16.
2 points
Which team should be in charge of resuming operations at an alternate site?
17.
2 points
Which of these is a typical infection vector for APT-­malware?
18.
2 points
Which of these is NOT an APT campaign name?
19.
2 points
Which of these incident indicators is an example of a definite indicator of an actual incident?
20.
2 points
Which of these vulnerabilities was most recently discovered?
21.
2 points
in what disaster recovery phase do you evaluate the need to invoke the business continuity plan?
22.
2 points
What type of IDPS is most suitable for processing encrypted data?
23.
2 points
Which of these incident indicators is an example of a definite indicator of an actual incident?
24.
2 points
Which of these statements is NOT correct?
25.
2 points
Which of these is NOT a good example of methods for collecting BIA data?
26.
2 points
What can ISPs do to prevent IP source address spoofing commonly used in DDoS attacks?
27.
2 points
What can the tool Suricata be used for?
28.
1 point
What tool would be most useful when dealing with APTs?
29.
2 points
What do we call the remaining risk after application of risk control strategies?
30.
2 points
Which CSIRT organizational model usually has the most diverse constituency?
31.
2 points
What key downtime metric describes the period of time within which systems, applications, or functions must be recovered after an outage?
32.
2 points
Which of these indicators of malicious code indicates a possible Trojan horse infection?
33.
1 point
What kind of backup technique would you choose for a mission­‐critical system?
34.
2 points
What is an example of an atomic indicator?
35.
2 points
Which of these decoys require the least amount of data monitoring?
36.
2 points
Which of these is NOT an example of a shared-site resumption strategy?
37.
1 point
Name three key downtime metrics
38.
2 points
What can the tool scapy be used for?
39.
2 points
What should be the first step when building a CSIRT?
40.
2 points
Which of these indicators of malicious code indicates a possible Trojan horse infection?
41.
2 points
Which of these actions is NOT a containment, eradication or recovery action?
42.
2 points
Which of these tools would be most useful for analyzing a pcap file?