Check answers here:
Modules 18 – 20: Network Defense Group Exam (Answers)
Quiz-summary
0 of 33 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
Information
Modules 18 - 20: Network Defense Group Exam - Test online
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 33 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- Answered
- Review
-
Question 1 of 33
1. Question
1 pointsWhy is asset management a critical function of a growing organization against security threats?Correct
Incorrect
-
Question 2 of 33
2. Question
1 pointsIn a defense-in-depth approach, which three options must be identified to effectively defend a network against attacks? (Choose three.)Correct
Incorrect
-
Question 3 of 33
3. Question
1 pointsWhat is the first line of defense when an organization is using a defense-in-depth approach to network security?Correct
Incorrect
-
Question 4 of 33
4. Question
1 pointsWhat three goals does a BYOD security policy accomplish? (Choose three.)Correct
Incorrect
-
Question 5 of 33
5. Question
1 pointsWhich two options are security best practices that help mitigate BYOD risks? (Choose two.)Correct
Incorrect
-
Question 6 of 33
6. Question
1 pointsWhat is the purpose of mobile device management (MDM) software?Correct
Incorrect
-
Question 7 of 33
7. Question
1 pointsWhat does the incident handling procedures security policy describe?Correct
Incorrect
-
Question 8 of 33
8. Question
1 pointsMatch the type of business policy to the description.Correct
Incorrect
-
Question 9 of 33
9. Question
1 pointsMatch the threat intelligence sharing standards with the description.Correct
Incorrect
-
Question 10 of 33
10. Question
1 pointsWhat is the primary purpose of the Forum of Incident Response and Security Teams (FIRST)?Correct
Incorrect
-
Question 11 of 33
11. Question
1 pointsWhat is the primary purpose of the Malware Information Sharing Platform (MISP) ?Correct
Incorrect
-
Question 12 of 33
12. Question
1 pointsWhich statement describes Trusted Automated Exchange of Indicator Information (TAXII)?Correct
Incorrect
-
Question 13 of 33
13. Question
1 pointsWhich organization defines unique CVE Identifiers for publicly known information-security vulnerabilities that make it easier to share data?Correct
Incorrect
-
Question 14 of 33
14. Question
1 pointsHow does FireEye detect and prevent zero-day attacks?Correct
Incorrect
-
Question 15 of 33
15. Question
1 pointsWhat is the primary function of the Center for Internet Security (CIS)?Correct
Incorrect
-
Question 16 of 33
16. Question
1 pointsWhat is CybOX?Correct
Incorrect
-
Question 17 of 33
17. Question
1 pointsA web server administrator is configuring access settings to require users to authenticate first before accessing certain web pages. Which requirement of information security is addressed through the configuration?Correct
Incorrect
-
Question 18 of 33
18. Question
1 pointsWhen designing a prototype network for a new server farm, a network designer chooses to use redundant links to connect to the rest of the network. Which business goal will be addressed by this choice?Correct
Incorrect
-
Question 19 of 33
19. Question
1 pointsWhen a security audit is performed at a company, the auditor reports that new users have access to network resources beyond their normal job roles. Additionally, users who move to different positions retain their prior permissions. What kind of violation is occurring?Correct
Incorrect
-
Question 20 of 33
20. Question
1 pointsWhich component of the zero trust security model focuses on secure access when an API, a microservice, or a container is accessing a database within an application?Correct
Incorrect
-
Question 21 of 33
21. Question
1 pointsWhat is the purpose of the network security accounting function?Correct
Incorrect
-
Question 22 of 33
22. Question
1 pointsWhich term describes the ability of a web server to keep a log of the users who access the server, as well as the length of time they use it?Correct
Incorrect
-
Question 23 of 33
23. Question
1 pointsWhat are two characteristics of the RADIUS protocol? (Choose two.)Correct
Incorrect
-
Question 24 of 33
24. Question
1 pointsMatch the information security component with the description.Correct
Incorrect
-
Question 25 of 33
25. Question
1 pointsWhich AAA component can be established using token cards?Correct
Incorrect
-
Question 26 of 33
26. Question
1 pointsWhat is a characteristic of the security artichoke, defense-in-depth approach?Correct
Incorrect
-
Question 27 of 33
27. Question
1 pointsWhat is a characteristic of a layered defense-in-depth security approach?Correct
Incorrect
-
Question 28 of 33
28. Question
1 pointsWhat is the benefit of a defense-in-depth approach?Correct
Incorrect
-
Question 29 of 33
29. Question
1 pointsMatch the term to the description.Correct
Incorrect
-
Question 30 of 33
30. Question
1 pointsWhat is the principle behind the nondiscretionary access control model?Correct
Incorrect
-
Question 31 of 33
31. Question
1 pointsWhich type of access control applies the strictest access control and is commonly used in military or mission critical applications?Correct
Incorrect
-
Question 32 of 33
32. Question
1 pointsPasswords, passphrases, and PINs are examples of which security term?Correct
Incorrect
-
Question 33 of 33
33. Question
1 pointsHow does AIS address a newly discovered threat?Correct
Incorrect