Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

e. None of the above 15. An Incident Become a Disaster when: a. The organization

ID: 3841663 • Letter: E

Question

e. None of the above 15. An Incident Become a Disaster when: a. The organization is unable to mitigate the impact of an incident duringthe b. Incident never becomes a disaster c. If it happens in the middle of night. ed. After 5 PM when the office closes e. None of the above 16. Using Wire shark you can follow traffic and notice pattems signatures of trame to capture hackers a. Man in the middle b. Spoofing c, ARP Poisoning d. Denial of Service e. All of the above 17. Which Technique is useful to make the password strong a. Mix letters, numbers and symbols, and use case sensitivity. b. Use punctuation where possible in the password c. Longer password are better than shorter d. Do not use the same password for everything. e. All of the above 18. Controls to eliminate vulnerabilities must be: a. Hard to follow and execute. b. Cheaper to produce c. Same for all vulnerabilities d. Efficient, simple to follow and appropriate to the vulnerabilities e. All of the above 19. The best way to prevent Ransom attack are: a. Have common sense and use basic cyber security methods b. Make sure the OS and all software are up-to-date c. Use a paid anti-virus with auto update and real time scanner in conjunction with an anti malware program d. All of the above e. None of the above 20. The Biometrics is the measurement and analysis of a human's unique features and can be of the following kinds: a. Physiological and Behavioral b. Behavioral and Emotional c. Emotional only

Explanation / Answer

15. a
If the organization is unable to stop or slow down the impact of an incident, then the incident becomes a disaster.

16. All of the above
Using wireshark you can detect all the above mentioned attacks

17. All the above

It is always adviced to use long passwords with proper mix of small-case, upper-case, numeric digts, punctuation marks and special symbols.

18. d

Controls to eliminate vulnerabilites must be efficient and simple to follow.

19. All of the above

a. Having common sense and using basic security methods refers to verifying source of emails or other files before downloading, as in, whether it can be trusted or not.
b. Recent case of WannaCry ransomware infection was largely on the systems which didn't had an updated path for their Windows OS. So, all software and OS must be up to date.
c. Anti-virus and anti-malware software are obivioulsy required.

20. a

Physiological characteristics are related to the shape of the body such fingerprint, face recognition, DNA, retina. Behavioral characteristics are related to the pattern of behavior such as voice, rythm. These things are used in Biometrics.

21. d, all the above

Some one must document the diaster, so it can be helpful in recovery process. And must notify the key personnel who has proper authority to authorize or take some appropriate decisions based on the situation. Also, clear delegation of roles and responsiblities is a must.

Note : I am entitled to answer only 4 sub parts, however I answered more than that