As a student, I get bored. I find stuff to watch or play and this show has me hooked. Liked it so much I decided to share it with you guys. Enjoy. S1.1 S1.2 S1.3 S1.4 S1.5 S1.6
- Get link
- X
- Other Apps
CYB 205 Infrastructure Administration
Q: When we call an attack a "zero-day exploit," we mean that:
A: the attack exploited a previously unreported vulnerability before the affected systems or software vendor recognized and acknowledged it, reported or disclosed it, or provided a warning to its customers.
Explanation: Option D correctly explains the period from discovery in the wild to first recognition by system owners, users, or the IT community, and how this element of surprise may give the attacker an advantage. Despite the name, the 24 hours of a day have nothing to do with the element of surprise associated with attacking a heretofore-unknown vulnerability. Option C is false since the term is well understood in IT security communities.
- Get link
- X
- Other Apps
Popular posts from this blog
CYB 205 Infrastructure Administration Q: Jim is implementing an IDaaS solution for his organization. What type of technology is he putting in place? A: Identity as a service Explanation: Jim is using the IDaaS (Identity as a service) technology, which provides an identity platform as a third-party service. It is a cloud-based service for obtaining subscription-based identity management and access control capabilities.Answers B and C are incorrect. These are the invalid choices.Answer D is incorrect. OAuth is a standard that applications can use to provide client applications with secure delegated access.
CYB 205 Infrastructure Administration Q: Alejandro is an incident response analyst for a large corporation. He is on the midnight shift when an intrusion detection system alerts him to a potential brute-force password attack against one of the company’s critical information systems. He performs an initial triage of the event before taking any additional action. A: Activate the incident response team. Explanation: The incident response process consists of a series of steps that start with detection and run through response, mitigation, reporting, recovery, and remediation, ending with a lessons learned and onward preparation phase. After the detection of a security incident, the next step in the process is the response, which should follow the organization’s formal incident response procedure. The first step of this procedure is activating the appropriate teams, including the organization's computer security incident response team (CSIRT).Answers A and D are incorrect. Lessons lear...
CYB 205 Infrastructure Administration Q: Elaine is developing a business continuity plan for her organization. What value should she seek to minimize? A: RTO Explanation: Elaine should seek to minimize the recovery time objective value. The goal of business continuity planning exercises is to reduce the amount of time required to restore operations. This is done by minimizing the recovery time objective (RTO). RTO is the amount of time expected to return an IT service or component to operation after a failure.Answer C is incorrect. SLAs (service-level agreements) are written contracts that document service expectations.Answers B and D are incorrect. The Secure Socket Layer (SSL) and the Lightweight Directory Access Protocol (LDAP) are the network protocols.
Comments
Post a Comment