Exam Preparation Tasks
Review All Key Topics
Review the most important topics in the chapter, noted with the Key Topic icon in the outer margin of the page. Table 3-2 lists a reference of these key topics and the page numbers on which each is found.
Table 3-2 Key Topics
Key Topic Element |
Description |
Page |
Summary |
Describe what are vulnerabilities |
166 |
Summary |
Define what are threats |
167 |
Summary |
Define threat actors |
168 |
Summary |
Describe what is threat intelligence and why is it useful |
168 |
Summary |
Define what are exploits |
170 |
Summary |
Describe confidentiality, integrity, and availability |
171 |
Summary |
Describe risk and risk analysis |
171 |
Summary |
Define and provides examples of PII |
173 |
Summary |
Define and provides examples of PHI |
174 |
Summary |
Decribe the principle of least privilege |
174 |
Summary |
Define what is a security operations center |
175 |
Summary |
Describe runbook automation |
176 |
Summary |
Define and describe chain of custody |
177 |
Summary |
Describe what is reverse engineering |
178 |
Define Key Terms
Define the following key terms from this chapter, and check your answers in the glossary:
Vulnerabilities
threats
threat actors
exploits
Q&A
The answers to these questions appear in Appendix A, “Answers to the ‘Do I Know This Already?’ Quizzes and Q&A Questions.” For more practice with exam format questions, use the exam engine on the website.
Which of the following statements are true about vulnerabilities?
A vulnerability is a threat on a system.
A vulnerability is an exploitable weakness in a system or its design.
Vulnerabilities can be found in protocols, operating systems, applications, hardware, and system designs.
Vulnerabilities are exploits that are discovered every day in software and hardware products.
On which of the following can exploit kits be run from?
Web servers
Email servers
NTP servers
Firewalls
Which of the following are examples of exploit kits?
Angler
Mangler
Blackhole
Black ICE
Which of the following describe what a threat is?
Threats and vulnerabilities are the same.
A threat is an exploit against a patched vulnerability.
A threat is any potential danger to an asset.
A threat is a piece of software aimed at exploiting a vulnerability.
What is an IoC?
An indicator of compromise
An indicator of containment
An intrusion operating control
An intrusion of compromise
Which of the following are provided by threat intelligence feeds?
Indicators of compromise
IP addresses of attacking systems
The overall risk score of all vulnerabilities in the corporate network
The overall risk score of threats in the corporate network
The way you document and preserve evidence from the time you start the cyber forensics investigation to the time the evidence is presented in court is referred to as which of the following?
Chain of compromise
Custody of compromise
Chain of forensics
Chain of custody
What are decompilers?
Programs that take an executable binary file and attempt to produce readable high-level language code from it
Programs that take a non-executable binary file and attempt to produce compiled code from it
Programs that take a non-executable binary file and attempt to produce encrypted code from it
Programs that execute a binary file and attempt to crack the encryption of it
Which of the following are metrics that can measure the effectiveness of a runbook?
Mean time to repair (MTTR)
Mean time between failures (MTBF)
Mean time to discover a security incident
All of the above
What is PHI?
Protected HIPAA information
Protected health information
Personal health information
Personal human information