Quiz 1
Quiz 1
00
1
Which of the following activities are signs of "Shadow IT" activities?
Employees tethering to their mobile phone while travelling, instead of using free coffeeshop
a.
WIFI.
Employees posting on public forum, discussing the election that is coming up, during office
c.
hour.
e. Employee downloading and using a portable version of their preferred text editor
2
Which of the following is/are countermeasure(s) to protect data in transit?
a. MD5 Hash
c. Anti-virus
e. Packet Capture
f. Deepfake
g. HTTP
h. HTTPS
3
Explain how secrecy can be achieved.
4
Which of the following are example(s) of continuous monitoring and authentication technology?
a. Penetration Testing
c. Digital Forensic
d. Denial of service
5
Which of the following defines an "assume breach" posture?
a. Enabling multi-factor authentication for all VPN and Internet accessible service
Continuously changing the hardware and software configuration of cloud and on-premise
b.
assets to confuse attackers
c. Turning off firewall and other digital assets after office hour
Setup an threat hunting team to actively look around the Company network for any signs of
d.
compromise or anomalies
Setup an threat hunting team to actively look around the Company network for
any signs of compromise or anomalies
Question 6 Complete Mark 1.00 out of 1.00
6
Explain what is essential for a company to pay attention to, when incident response service is outsourced?
A good service request letter that provide a checkbox for all possible cyber attacks and
a.
threats, for easy activation of service
A good service level agreement (SLA) that meets the company's required operational
b.
response timing.
Malware reverse engineering capability so that ransomware keys can be recovered, without
c.
the need to pay for ransoms.
e. At least a team of 6 on standby, so that there is an expert for every type of OS.
A good service level agreement (SLA) that meets the company's required
operational response timing.
Question 7 Complete Mark 1.00 out of 1.00
7A
What is MTPE?
8A
What item(s) in security posture is/(are) related to the IR process?
Finish review
Jump to...
On the lands that we study, we walk, and we live, we acknowledge and respect the traditional custodians and
cultural knowledge holders of these lands.
University of Wollongong
Student IT Support Student Support services Learning Platform Support Learning & Teaching Hub