18 20 Answer
18 20 Answer
in Questions Bank.
NOTE: If you have the new question on this test, please comment Question
and Multiple-Choice list in form below this article. We will update answers
for you in the shortest time. Thank you! We truly value your contribution
to the website.
purchases.
decommissioned.
firewall
proxy server
IPS
permitted to access
describe the rights to access and activities permitted to security
personnel on the device
Explanation: A comprehensive BYOD policy should
devices
compromised
5. Which two options are security best practices that help mitigate BYOD
risks? (Choose two.)
Use paint that reflects wireless signals and glass
building.
Keep the device OS and software updated.
Only allow devices that have been approved by
feature.
vulnerabilities.
system.
cyberattacks.
worldwide
the teams.
11. What is the primary purpose of the Malware Information Sharing
Platform (MISP) ?
to publish all informational materials on known
network operations
known threats
vulnerabilities.
It is the specification for an application layer protocol that
allows the communication of CTI over HTTPS.
Explanation: Trusted Automated Exchange of Indicator
DHS
FireEye
MITRE
Explanation: The United States government sponsored the
cybersecurity vulnerabilities.
14. How does FireEye detect and prevent zero-day attacks?
by establishing an authentication parameter prior
malware
worldwide
to provide a security news portal that aggregates the latest breaking news pertaining to alerts,
exploits, and vulnerabilities
to maintain a list of common vulnerabilities and exposures (CVE) used by security
organizations
to offer 24x7 cyberthreat warnings and advisories, vulnerability identification, and mitigation
and incident responses
to provide vendor-neutral education products and career services to industry professionals
worldwide
over HTTPS.
It is a set of standardized schemata for specifying, capturing,
characterizing, and communicating events and properties of
network operations.
It enables the real-time exchange of cyberthreat
integrity
scalability
confidentiality
Explanation: Confidentiality ensures that data is accessed
manageability
security
scalability
network policy
password
audit
workforce
workload
workplace
user.
22. Which term describes the ability of a web server to keep a log of the
users who access the server, as well as the length of time they use it?
authentication
accounting
assigning permissions
authorization
are used.
23. Match the information security component with the description.
information. : confidentiality
alteration. : Integrity
authorization processes
the use of TCP port 49
authorization
authentication
auditing
are used.
26. What is a characteristic of the security artichoke, defense-in-depth
approach?
Threat actors can easily compromise all layers
safeguards.
28. What is the benefit of a defense-in-depth approach?
All network vulnerabilities are mitigated.
core is required.
The effectiveness of other security measures is not impacted
when a security mechanism fails.
Explanation: The benefit of the defense-in-depth approach
be to accessed.
applications.
information.
Non-discretionary access control – Also known as role-
organization.
access
authentication
authorization
threat
defense mechanisms