Wednesday , December 18 2024
Breaking News

Certiprof Cyber Security Foundation Exam Answers – CertiProf CSFP Exam Answers

Certiprof Cyber Security Foundation – CSFPC™ Exam Answers

  • Ambient temperature
  • Pollution
  • Noise
  • All of the above
  • Saltzer and Schroeder Principles
  • The Precautionary Principle
  • Latent Design Conditions
  • NIST Principles
  • Which means being able to identify the likely author and operator
  • To understand what damage can be done due to the malware program
  • To be able to know the amount of data that has been lost or corrupted
  • Both B and C are correct, and A is incorrect
  • Threat Management
  • Failure Management
  • Incident Management
  • Risk Management
  • First Step
  • Second Step
  • Last Step
  • Third Step
  • Timestamp, Hostname, Process, Priority, and PID
  • DNS and Routing info, Data security gateway ID
  • Authentication ID, Encryption and decryption info, and data privacy flag
  • Routers CPU ID, Transport Layer Security protocol info, and Syslog current version
  • Threats, vulnerabilities, likelihood and impact are identified
  • Inform about the actions
  • Continually update the risk assessment
  • Identifying the purpose
  • Limit number of characters to 9
  • Expire only passwords with more than 6 characters
  • Provide flash drives to save a list of passwords
  • Use of password managers
  • User Access
  • Reconnaissance
  • Roles
  • Intrusion detection
  • Data integrity
  • Data integrity
  • Anonymization
  • Duplicity
  • Systems-Theoretic Accident Model and Process (STAMP)
  • The Open Group Architectural Framework (TOGAF)
  • SABSA
  • Dependency Modelling
  • Reliability
  • Integrity
  • Confidentiality
  • Availability
  • Least common mechanism
  • Open design
  • Least privilege
  • Least access
  • Territorial prescriptive
  • Territorial assertive
  • Territorial data protection
  • None of the above
  • General maintenance and traffic monitoring
  • Capture traffic
  • Security and incident management
  • Traffic configuration
  • As informational control
  • As confidentiality
  • As transparency
  • All of the above
  • Incompetence
  • Incapacity
  • Indecision
  • None of the above
  • It can easily clean up its attack operations right after its execution ANS
  • A memory-resident malware has no advantage in the context of hiding its attack operations
  • Cleaning up its attacks is possible, but it may require additional malware utilities
  • It is difficult to clean up its attack operations if the compromised system is guarded by real-time anti-virus programs
  • Verification Methods
  • Security Architecture
  • Security Economics
  • None of the above
  • Trade secret
  • Copyright
  • Logo protection
  • Trademark
  • SPA
  • Trade Secret
  • Copyright
  • Trademark
  • Involvement
  • Education
  • Password Policies
  • Training and inducement of behavior change
  • Possibility of occurrence (uncertainty)
  • Combination of outcomes and possibility of occurrence
  • Relationship between risk and security
  • Outcomes that have an impact on what human’s value
  • Encryption
  • Coding
  • Cryptography
  • Obfuscation
  • Exit
  • Entry
  • Middle
  • All of the above
  • This will not allow us to update our network and endpoint sensors to detect and block such activities
  • This will help to identify which machines have malware and take corrective actions
  • This will let us remove the malware or even completely wiping the computer clean and reinstalling everything
  • Both B and C are correct
  • Complete software and its working depend on the type of compromised Operating system
  • It is an incomplete software and is used just for illustration of the Malware program life cycle
  • An incomplete program and it needs the help of already installed programs to plan for attack
  • A Standalone Malware program is a complete software that can run on its own when installed on a target system and executed
  • Information Technology discipline
  • CISO
  • Security Architecture
  • Software Engineering
  • Extradition
  • Indictment
  • Impeachment
  • Recrimination
  • Dummy addition
  • Data injection
  • Suppression
  • None of the above
  • True Negatives are normal actions that occur in the trace and should not be stated in alerts by the detector
  • True Positives are attack actions that should be stated in alerts by the detector         
  • False positives are also known as false alerts & False negatives also known as miss or type II errors
  • All of the above
  • Traffic metadata
  • Network metadata
  • Wireshark metadata
  • Host based metadata
  • Mathematical, Statistical
  • Computational, Symbolic
  • Logical, Mathematical
  • Symbolic, Logical
  • The identifiable malware features are changed to be unique to each instance of the malware
  • Malware instances look different from each other, but they all maintain the same malware functionality
  • Some common polymorphic malware techniques include packing
  • All A, B & C are correct.
  • Second school
  • Third school
  • First school
  • Harvard University
  • Best evidence
  • Corroborative evidence
  • Conclusive evidence
  • Direct evidence
  • The HSM is designed to establish the TLS session beforehand the application server delivers any information
  • HSM transfers the burden of establishing the TLS session external to the application server
  • TLS secured traffic is encrypted and decrypted at the HSM, and streams in clear to the server, and triggers IDPSes and WAFs to evaluate the traffic
  • All the options A, B & C include the working functionality of HSM
  • Threat environment is not static
  • Hardware is not powerful enough
  • System security is leaked
  • Human errors
  • The full malware lifecycle that includes development, deployment, operations, and monetization
  • The middle half of the malware lifecycle that includes only deployment & operations
  • The 2nd half of the malware lifecycle that includes only operations and monetization
  • The 1st half of the malware lifecycle that includes only development & deployment
  • environmental vulnerability
  • 0-day attacks
  • economic vulnerability and social vulnerability
  • physical and real-time vulnerability
  • ANSI
  • OWASP
  • ISO
  • NIST
  • Security Architecture and Design
  • Security Capability and Intrinsic Behaviors
  • Life Cycle Security
  • All of the above
  • 12
  • 3
  • 7
  • 6
  • In house processing
  • Outsourcing
  • Data processing
  • None of the above
  • Bringing together multiple stakeholders views of what a system should and should not do
  • Exploiting security breaches which emerge out of the complex interactions of many parts og your system
  • Establishing system security requirements before you have decided on the system is exact physical design
  • Analysing the risks faced by individua;s technical components
  • Human Factors
  • Privacy & Online Rights
  • Risk Management & Governance
  • Law & Regulations
  • Syslog , IDXP , HTTP or AMQP
  • CLNP Connections Networking Protocol & HSRP Hot Standby Router Protocol
  • VRRP Virtua; Router Redundancy Protocol &S7 signing protocol
  • Ethernet and TCP / Ip
  • Precautionary Conditions
  • Latent Design Conditions
  • NIST conditions
  • None of the above
  • BAckup and Restore
  • Security Monitoring
  • Recovery files
  • None of the above
  • Impact
  • Risk Analysis
  • Likelihood
  • Vunerability
  • S7 Signifing protocol
  • NTP Network Time Protocol
  • TCP /IP
  • ARP
  • consistently measured without subjective criteria
  • Cheap to gather prefarbly in an automated way
  • Express results with quantitative label units of measure
  • Contextually specific and relevant enough to decision makers that they can take a decision
  • Emblematic
  • Transparent
  • Secisiontic
  • Technocratic
  • Password Policies
  • Training and inducement behaviour Change
  • Education
  • Involvement
  • Procedures
  • Policies
  • IT Service Management
  • Code of conduct
  • Penestration testing
  • Complete  Mediation
  • Open Deisgn
  • Fail Safe Defaults
  • Operational
  • Analytical
  • Strategic
  • Tactical
  • Log Management
  • Email Encrytion
  • Software Encrytion
  • Data backup
  • The Referance Monitor Concept
  • Defense in Depth
  • Isolation
  • Behaviour
  • All are in the order in which they are implemented
  • They are in random Order
  • in the context of persistent malware the order of system stack layers does nit matter
  • All layer of the system slack are mentioned in the ascending order
  • GPU Designed for visual AI
  • Routers CPU
  • Transit Gateway CPU
  • Ambiguous risks
  • Uncertain risks
  • Complex Risks
  • Routine Risks
  • Impact
  • Likelihood
  • Attack
  • Threat
  • Mask Attack using Trojans as Botnets
  • Unauthorized accound Access
  • Email Spoofing and spamming
  • Report vunerability in any system
  • Codes
  • Ethics
  • Compliance
  • Contracts
  • The HSM is designed to establish the TLS session beforehand the application server delivers any information
  • HSM tranfers the burden of establishing the TLS session ecternal the application server
  • TLS secured traffic is encrypted and decrypted at the HSM and strams in clear to the server and triggers IDPSes and WAFs to evaluate the traffic
  • All the Options A, B, & C include the working functionality of HSm
  • Establishing a command-and-control channel for attackers to remotely commander the victims system
  • Reconnaissance is the 1st step where an attacker identifies or attracts the potential targets by scanning
  • Exploiting a vunerability and executing malicious code on the victims system
  • The 1st Step is to gain access to the targets by sending crafted input to trigger a vunerability
  • PII
  • PHI
  • Integrity of the information
  • Contextual integrity
  • NIST
  • FAIR
  • ISO
  • ITIL
  • Ballot Secrecy
  • Ballot anonymity
  • Vote confidence
  • Vote secrecy
  • Place probable cause
  • Address conflict of law
  • Enforce laws or regulations
  • All of the above
  • This supposedly supports the detection of what?
  • economic vulnerability and social vulnerability
  • environmental vulnerability
  • physical and real-time vulnerability
  • 0-day attacks
  • STRIDE
  • Attack Trees
  • FAIR
  • Octave Allegro
  • 3
  • 2
  • 6
  • 4
  • Include monitoring host activities involved in encryption
  • Use the layer 7 capability firewall for detection
  • Analyze the statistical properties of traffic
  • Look for synchronized activities both in C&C like traffic and malicious traffic
  • Type of broadband company used by the firm
  • System and network
  • Characteristics of work done in the firm
  • Know the nature of the organization
  • The configuration of the network segment to which the collection network interface is attached.
  • Understanding of network architecture.
  • Design configuration of the whole network interface
  • Network configuration in promiscuous mode.
  • Command and control
  • Presence of vulnerability
  • Nature of the threat
  • All of the above
  • Intrusion Detection
  • Reconnaisance
  • Roles
  • user Access
  • Injecting trojans to a target victim
  • MiTM
  • Phising
  • Credit Card details mask in deep web
  • Humans do not have the physical and mental capacity to review such indicators
  • Humans are decting anomates
  • Human are busy with alert signals
  • Human can only focus on one back at any one time
  • Incompetence
  • Incapacity
  • indecision
  • None of the above
  • Cryptography
  • Adversarial Behaviours
  • Law 7 Regulations
  • Forensics
  • Forgery
  • Data Theft
  • Installing antivirus for protection
  • Damage to data and systems
  • Operational
  • Strategic
  • Tactical
  • Analytical
  • In terms of volume and number of sources
  • In the context of vulnerability
  • With respect to loss of data
  • None of the above
  • Hub
  • Honeypot
  • Honeywall
  • Honeywell
  • After providing an ML algorithm samples of different malware families for ‘training’, the resultant model can classify new, unseen malware as belonging to one of those families
  • Instructions, control flow graphs, and call graphs
  • system call sequences and other statistics (e.g., frequency and existence of system calls), system call parameters, data flow graphs & network payload features
  • Both B and C are examples of machine learning
  • Advance Fee Fraud
  • Social Media Fraud
  • E-Commerce Fraud
  • Automobile Fraud
  • Denial of services
  • Low Orbit Ion Cannon (LOIC) Program
  • Netstrickes
  • Web Defacements
  • Compressing and encrypting part of the malware
  • Operating system kernel, drivers, and Application Programming Interfaces (APIs)
  • Uncompressed and decrypted part of the malware program
  • Static and run-time libraries in n the infected machine
  • As the botmaster has little control of the IP address diversity and down-time for compromised machines in a fast-flux network, we can use these features to detect fast-flux
  • we perform takedown of C&C domains by ‘sinkhole’ the domains, i.e., making the C&C domains resolve to the defender’s servers so that botnet traffic is ‘trapped’ (that is, redirected) to these servers
  • Among the algorithm-generated domains, the botmaster can pick a few to register (e.g., daily) and make them resolve to the C&C servers
  • we can partition the P2P botnet into isolated sub-networks, create a sinkhole node, or poison the communication channel by issuing commands to stop the malicious activities
  • During Packing
  • By Applying Dynamic Dataflow
  • When It Dissembled
  • When It Executes
  • True Positives (TP)
  • True Negatives (TN)
  • False positives (FP)
  • False negatives (FN)
  • They pass all legitimate traffic through firewall
  • They deploy IDS system between links
  • They reserve bandwidth and bandwidth usage control for legitimate traffic
  • They stop all traffic for some time
  • Network threats are occasionally monitored
  • The technical staff is well educated in detecting malware
  • Cyber-risk is effectively controlled in organizations
  • Top management is properly trained regarding cybersecurity
  • Low transparency, Unreliability support of architecture semantics.
  • Low transparency, Artifacts from paravirtualization
  • Less control over the system state
  • Lack of fine-grained introspection, Scalability and cost issues, Slower to restore to clean state
  • Money Mules
  • Contractual Partners
  • Outsource Criminal
  • White-Hat Hacker
  • Detecting the analysis environment.
  • Obfuscating malicious code
  • Trigger-conditions to execute
  • Options A, B & C
  • Concolic Execution
  • Fuzzing
  • Dynamic analysis
  • Static Analysis
  • Confidentiality
  • Authorization
  • Integrity
  • Authentication
  • Malicious events
  • Internet worms, Browser Hijacker and Web Scripting Virus
  • Instant Messaging Worms, Overwrite Virus and File Infector
  • Computer worms and Multipartite Virus
  • SRE
  • NIST
  • CVE
  • CTI
  • The analysis output may not be consistent with the actual malware behaviors (at runtime)
  • It is not possible to precisely determine a program’s behaviors statically (i.e. without the actual run-time input data)
  • The packed code cannot be statically analyzed as it is encrypted and compressed data until unpacked into executable code at run-time
  • All the above reasons are the main limitations of static analysis–
  • Rotate Flux
  • Fast Flux
  • Shut Down Flux–
  • Domain Flux
  • Spam and Phish Emails
  • PowerShell to Inject Malware
  • Advanced Persistent Threats (APTs)
  • Distributed Denial-of-Service (DDoS) Attack–
  • A kind of malicious .exe file that is downloaded within a movie
  • A third-party software that is harmful for Operating Systems–
  • A plugin installed in a Web Browser
  • A piece of code that is part of a useful program downloaded by a user

About Clear My Certification

Check Also

ESL003: Upper-Intermediate English as a Second Language Exam Answers

ESL003: Upper-Intermediate English as a Second Language Exam Answers Learning a new language requires you …

Leave a Reply

Your email address will not be published. Required fields are marked *