Encryption, antivirus software, IDSs, firewalls, and the principle of least privilege are some examples of which control type?
Technical
Management
Operational
Succession
2. Multiple Choice
1 minute
1 pt
A _ is an electronic file used to transport keys used to encrypt or digitally sign messages.
digital certificate
key escrow
user patch
hash algorithm
3. Multiple Choice
1 minute
1 pt
When collecting evidence, a team starts with data in cache memory, followed by data in RAM, and finally data stored on local disk drives. This refers to what?
Order of Volatility
Chain of Custody
Layered Screenshots
Data Hijacking
4. Multiple Choice
1 minute
1 pt
Used in risk calculation to determine the probability of a vulnerability being exploited resulting in a loss.
Likelihood
Impact
MTVE
Risk Mitigation
5. Multiple Choice
1 minute
1 pt
Which specifies the technical and security requirements for planning, establishing, maintaining, and disconnecting a secure connection between two or more entities.
ISA
MTR
SLA
Cloud Policy
6. Multiple Choice
1 minute
1 pt
_ is when a user or process accesses elevated rights and permissions.
Privilege Escalation
User One-Up
Rights Exaggeration
User Whaling
7. Multiple Choice
1 minute
1 pt
Which is part of a Quantitative Risk Assessment and can identify how many times a specific type of incident occurs in a year?
ARO
SLE
MTTR
Annual Likelihood
8. Multiple Choice
1 minute
1 pt
_ identifies the average (the arithmetic mean) time it takes to restore a failed system.
MTTR
MTBF
MTTF
ATSR
9. Multiple Choice
1 minute
1 pt
A network-based _ system can examine and analyze network traffic looking for unauthorized data transmissions.
IDS
DLP
CA
DRM
10. Multiple Choice
1 minute
1 pt
_ is a operational/preventive control that ensures that changes don’t result in unintended outages.