0% found this document useful (0 votes)
23 views8 pages

Quiz 1

Uploaded by

Charlotte Goh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views8 pages

Quiz 1

Uploaded by

Charlotte Goh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Question 1 Complete Mark 1.00 out of 1.

00

1
Which of the following activities are signs of "Shadow IT" activities?

Employees tethering to their mobile phone while travelling, instead of using free coffeeshop
a.
WIFI.

Employee installing Teamviewer using local administrator account to remotely connect to


b.
office laptop, so they can work from home.

Employees posting on public forum, discussing the election that is coming up, during office
c.
hour.

d. Employee reporting suspected phishing emails

e. Employee downloading and using a portable version of their preferred text editor

The correct answers are:

Employee installing Teamviewer using local administrator account to remotely


connect to office laptop, so they can work from home.,
Employee downloading and using a portable version of their preferred text editor
Question 2 Complete Mark 2.00 out of 2.00

2
Which of the following is/are countermeasure(s) to protect data in transit?

a. MD5 Hash

b. SSL/TLS with self-signed certificates

c. Anti-virus

d. SSL/TLS with valid certificates

e. Packet Capture

f. Deepfake

g. HTTP

h. HTTPS

The correct answers are:SSL/TLS with valid certificates,HTTPS


Question 3 Complete Mark 2.00 out of 2.00

3
Explain how secrecy can be achieved.

a. Purple teaming and maturity assessment

b. Ensign and Infosecurity

c. Cryptography and access control

d. Identity Management and Phishing

e. Incident response and zero trust

f. Access control and denial of service

g. Data privacy and red teaming

h. Asset and risk management

The correct answer is:Cryptography and access control


Question 4 Complete Mark 1.00 out of 1.00

4
Which of the following are example(s) of continuous monitoring and authentication technology?

a. Penetration Testing

b. Cyber Threat Intelligence

c. Digital Forensic

d. Denial of service

e. User Entity Behaviour Analytic

The correct answer is:User Entity Behaviour Analytic


Question 5 Complete Mark 1.00 out of 1.00

5
Which of the following defines an "assume breach" posture?

a. Enabling multi-factor authentication for all VPN and Internet accessible service

Continuously changing the hardware and software configuration of cloud and on-premise
b.
assets to confuse attackers

c. Turning off firewall and other digital assets after office hour

Setup an threat hunting team to actively look around the Company network for any signs of
d.
compromise or anomalies

The correct answer is:

Setup an threat hunting team to actively look around the Company network for
any signs of compromise or anomalies
Question 6 Complete Mark 1.00 out of 1.00

6
Explain what is essential for a company to pay attention to, when incident response service is outsourced?

A good service request letter that provide a checkbox for all possible cyber attacks and
a.
threats, for easy activation of service

A good service level agreement (SLA) that meets the company's required operational
b.
response timing.

Malware reverse engineering capability so that ransomware keys can be recovered, without
c.
the need to pay for ransoms.

d. Backup expert to ensure a speedy recovery during times of need

e. At least a team of 6 on standby, so that there is an expert for every type of OS.

The correct answer is:

A good service level agreement (SLA) that meets the company's required
operational response timing.
Question 7 Complete Mark 1.00 out of 1.00

7A
What is MTPE?

a. Mean Time to Posture Evaluation

b. Mean Time to Performance Extreme

c. Mean Time to Privilege Escalation

d. Mean Time to Prevent Escape

The correct answer is:Mean Time to Privilege Escalation

Question 8 Complete Mark 1.00 out of 1.00

8A
What item(s) in security posture is/(are) related to the IR process?

a. Remediation and Rest

b. Identification and Verification

c. Recovery and Data Preservation

d. Detective and Spy

e. Containment and Recovery


The correct answer is:Containment and Recovery

Finish review

Jump to...

On the lands that we study, we walk, and we live, we acknowledge and respect the traditional custodians and
cultural knowledge holders of these lands.

University of Wollongong

Copyright © 2023 University of Wollongong


CRICOS Provider No: 00102E | TEQSA Provider ID: PRV12062 | ABN: 61 060 567 686
Copyright & disclaimer | Privacy & cookie usage | Web Accessibility Statement

Student IT Support Student Support services Learning Platform Support Learning & Teaching Hub

You might also like