according to nist, which of the following is an example of a ua attack? course hero

by Keon Abbott 10 min read

How does NIST define a threat?

Who had access to the evidence, in chronological order, Proof that the analysis is based on copies identical to the original evidence, The procedures followed in working with the evidence NIST defines a Threat as a "violation or imminent threat of violation of computer security policies, acceptable use policies, or standard security practices."

What is a a (n) Attack?

A(n) ____ attack is a method of combining attacks with rootkits and back doors. malware infection According to the 2010/2011 Computer Crime and Security Survey, ____ is "the most commonly seen attack, with 67.1 percent of respondents reporting it."

What are the activities required to identify the occurrence of a cybersecurity?

Describes the activities required to identify the occurrence of a cybersecurity incident Security continuous monitoring, detection and evaluating anomalies/incidents This key function ensures that organizational objectives and stakeholder needs are aligned with desired outcomes through effective decision making and prioritization.

What does the intrusion detection system alert him to?

He is on the midnight shift when an intrusion detection system alerts him to a potential brute-force password attack against one of the company's critical information systems. He performs an initial triage of the event before taking any additional action.

What is NIST 800-61?

A. NIST's Special Publication 800 -61 was created to provide guidelines for incident response and all related processes and procedures.

What chapter is incident response?

Start studying Chapter 5. Introduction to Incident Response and the Incident Handling Process. Learn vocabulary, terms, and more with flashcards, games, and other study tools.

What is a computer security incident?

According to the same document, "a computer security incident is a violation or imminent threat of violation of computer security policies, acceptable use policies, or standard security practices.". THE INCIDENT RESPONSE PLAN & PROCESS.

Is network monitoring part of the incident response process?

D. Although network monitoring is part of the preparation phase, it is not a phase as a whole of the incident response process, as defined by NIST.

Is identifying the attacking hosts part of the post incident phase?

B. Identifying the attacking hosts is not part of the post-incident phase.

What is malicious code?

also called malicious code, is software designed to gain access to targeted computer systems, steal information or disrupt computer operations.

How many devices do an intruder need to penetrate?

An intruder must penetrate three separate devices, Private network addresses are not disclosed to the Internet, Internal systems do not have direct access to the Internet

What is the core duty of cybersecurity?

The core duty of cybersecurity is to identify, respond and manage

What is cloud computing?

is defined as "a model for enabling convenient, on-demand network access to a shared pool of configurable resources (e.g., networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management or service provider interaction. Select all that apply.

Is encryption an essential form of access control?

Encryption is an essential but incomplete form of access control. The number and types of layers needed for defense in depth are a function of. Asset value, criticality, reliability of each control and degree of exposure. Put the steps of the penetration testing phase into the correct order.

How does Jacob attack a system?

A. Jacob executes an attack against a system using a valid but low-privilege user account by accessing a file pointer that the account has access to. After the access check, but before the file is opened, he quickly switches the file pointer to point to a file that the user account does not have access to.

What is SOC 1 type 1?

SOC 1, Type 1: D. A report that provides the auditor's opinions of financial statements about controls at the service organization and that includes a report on the opinion on the presentation of the service organization's system as well as suitability of the controls. 2.

Why is Tom tuning his security monitoring tools?

Tom is tuning his security monitoring tools in an attempt to reduce the number of alerts received by administrators without missing important security events. He decides to configure the system to only report failed login attempts if there are five failed attempts to access the same account within a one-hour period of time. What term best describes the technique that Tom is using?

Is a password shared by all users?

A. The password is shared by all users, making traffic vulnerable.