Questions:
- What are the most common types of Network based DDOS Attack?
A. Symmetric DDOS Attack.
B. Asymmetric DDOS Attack.
C. IPSEC Flooding Attack.
D. A & B.
E. None of the Above.
F. All of the Above.
Answer: (Option D).
- You are a security researcher, who works for ABC company. During a DDOS incident event, you discovered that the threat actor compromised a victim server by spoofing the source IP address and making a series of ICMP request. What type of DDOS attack did the threat actor use?
A. Fraggle Attack.
B. Application Reflector Attack.
C. Smurf Attack.
D. Amplified Attack.
E. None of the Above.
F. All of the Above.
Answer: (Option C).
- Which of these DDOS based attacks involves making a request on behalf of the target via a router, resulting to the router broadcasting these request over the entire network. ?
i. Amplification Attack.
ii. Fraggle Attack.
iii. Smurf Attack.
iv. Reflection Attack.
A. i, ii, iii, iv.
B. ii, iii, iv.
C. iii , iv.
D. ii, iii.
E. None of the Above.
F. All of the Above.
Answer: (Option D).
- Which of the following best describes how an organization can use the cybersecurity framework (NIST CSF), in managing cybersecurity risks?
i. Understand.
ii. Assess.
iii. Prioritize.
iv. Communicate.
A. ii, iii, iv.
B. iii, iv.
C. i, iii , iv.
D. ii, iv.
E. None of the Above.
F. All of the Above.
Answer: (Option F).
Episode 5-Video: A Video Analysis on the Questions and Answers of this weeks Episode…
- What are the core or nucleus of which the NIST Cybersecurity Framework based on?
i. Functions.
ii. Implementation.
iii. Categories.
iv. Subcategories.
A. ii, iii, iv.
B. iii, iv.
C. i, iii , iv.
D. ii, iv.
E. None of the Above.
F. All of the Above.
Answer: (Option C).
- In the new NIST Cybersecurity Framework, dubbed CSF 2.0, which of the function(s) is newly added to the core of the framework ?
A. Identify.
B. Govern.
C. Protect.
D. B & C.
E. None of the Above.
F. All of the Above.
Answer: (Option B).
- In the NIST Cybersecurity framework, what are the strategies you could use as a professional in assisting and informing your organization on improving its cybersecurity posture ?
i. Scope your organizational profile.
ii. Gathering needed information’s about your organization.
iii. Creating your organizational profile.
iv. Analyze Gaps and create an action plan for your organization.
v. Implement the action plan and update your organizations profile.
A. i, ii, iii, iv.
B. ii, iii, iv.
C. i, iii , v.
D. i, iv, v.
E. None of the Above.
F. All of the Above.
Answer: (Option F).
- Which of the Git command, copies the changes made from a GitHub repository.
A. Pull.
B. Push.
C. Clone.
D. Head.
E. None of the Above.
F. All of the Above.
Answer: (Option A).
- Which of these best describe the keys you add to your GitHub Account to enable you connect with your computer remotely.
A. SSH Keys & Private keys.
B. SSH Keys & Public Keys.
C. SSH Keys.
D. SFTP Protocol.
E. None of the Above.
F. None of the Above.
Answer: (Option B).
- Which of the following is the third phase of the Network Forensic Life Cycle?
A. Initiation (Accessing the Risk).
B. Maintenance.
C. Review and Reporting.
D. Acquisition.
E. None of the Above.
F. All of The Above.
Answer: (Option E).
Put your comments below in the comment section on your thoughts about this.