Access Millions of academic & study documents

Quiz 4 docx

Content type
User Generated
Showing Page:
1/6
Question 1
What would be a valid reason to assign a "1 - CRITICAL" risk factor to a found vulnerability?
It was determined that the vulnerability could cause employees to open emails with a possible virus.
It was determined that the vulnerability could impact the time it would take to stock incoming parts in the
warehouse.
It was determined that the vulnerability could be the greatest risk to the organization
It was determined that the vulnerability could close the factory for a couple of hours.
Question 2
A young woman waits in a local deli to hear the coffee order come in by phone from the law firm close by. The law
firm places the same order every morning. A delivery boy sets out to deliver the coffee but is met outside by the
woman near the front of the firm's building. The woman smiles and claims she is one of the lawyers; she offers to
bring the coffee upstairs for him and gives him a generous $10 tip. The boy shrugs, takes the money, gives her the
coffee order, and heads back to the deli.
The woman enters the firm's lobby and tells the two security guards that she is the delivery girl from the deli and has
the coffee order. She chats casually with one guard while she covertly peers over the shoulder of the 2nd guard and
watches him enter the security codes to access the elevators on the lobby computer. The first guard takes the coffee
and gives her a $2 tip. She gives them a big, friendly smile, says thank you, waves goodbye, and leaves the building.
10 days later she returns to the law firm at night, breaks into the building, accesses the elevators using the lobby
computer, and breaks into the offices upstairs to steal vital case information.
Which domain was exploited by the woman perpetrator?
The LAN domain
The User domain and the Remote Access domain
The Workstation domain
The System/Application domain
Question 3
Which of the threats below is primarily a risk to the Systems/Application domain?
A fire destroys the primary data center
There is a major network outage
A hacker accesses the internal network from a public Internet cafe.
None of the above
Question 4
Three vulnerabilities were determined for an organization:

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/6
Employee Productivity
Compliance shortcomings
Vulnerability in protecting Intellectual Property
You are about to assign Risk factors "1" , "2" , and "3" to these vulnerabilities to present to management. How
would you prioritize these risks?
1- Keeping Employee Productivity up is the most serious risk, then 2-Compliance, then 3- Intellectual Property
1- Protecting Intellectual Property is the most serious risk, then 2-Employee Productivity, then 3- Compliance
1-Compliance is the most serious risk, then 2-Intellectual Property, then 3-Employee Productivity
All three are equally important and should have equal rating factors.
Question 5
A pharmaceutical sales person has a route of doctor's offices that he visits to see if they need to replenish any of the
drug supplies in the offices. He carries with him a tablet with a cellular data plan from which he can place orders.
The transactions are processed in real-time via secure browser over the Internet to access the sales-order entry
system. Which of the seven domains would have the primary focus of secure communications?
Question 6
Match the risk mitigation tool or technique to the vulnerability: 3 wrong
B.
User opens
unknown
email
attachment
E.
Operating
system has
known
vulnerability
D.
High
volume
employee
Internet
traffic
degrades
network
performance
A.
Implement IDS system
B.
Email filtering and quarantine
C.
Implement VPN with secure encrypted
communication
D.
Install web filtering
E.
Make sure security patches are up to date

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/6

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 6 pages?
Access Now
Unformatted Attachment Preview
Question 1 What would be a valid reason to assign a "1 - CRITICAL" risk factor to a found vulnerability? It was determined that the vulnerability could cause employees to open emails with a possible virus. It was determined that the vulnerability could impact the time it would take to stock incoming parts in the warehouse. It was determined that the vulnerability could be the greatest risk to the organization It was determined that the vulnerability could close the factory for a couple of hours. Question 2 A young woman waits in a local deli to hear the coffee order come in by phone from the law firm close by. The law firm places the same order every morning. A delivery boy sets out to deliver the coffee but is met outside by the woman near the front of the firm's building. The woman smiles and claims she is one of the lawyers; she offers to bring the coffee upstairs for him and gives him a generous $10 tip. The boy shrugs, takes the money, gives her the coffee order, and heads back to the deli. The woman enters the firm's lobby and tells the two security guards that she is the delivery girl from the deli and has the coffee order. She chats casually with one guard while she covertly peers over the shoulder of the 2nd guard and watches him enter the security codes to access the elevators on the lobby computer. The first guard takes the coffee and gives her a $2 tip. She gives them a big, friendly smile, says thank you, waves goodbye, and leaves the building. 10 days later she ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.
Studypool
4.7
Indeed
4.5
Sitejabber
4.4