ВУЗ: Не указан
Категория: Не указан
Дисциплина: Не указана
Добавлен: 04.12.2023
Просмотров: 45
Скачиваний: 1
ВНИМАНИЕ! Если данный файл нарушает Ваши авторские права, то обязательно сообщите нам.
ENDTERM
-
How many penetration testing utilities does BlackArch Linux contain?
1359+
600
16
64
-
What is one of the most common types of attack on a website, or rather on any type of SQL databases as part of sites
Exploit
SQL injection+
Debuggers
-
Active audit, in turn, can be conditionally divided into two types: indicate the types
They are internal and external audits. Internal audits focus on the current statements about improvements, external audits focus on financial statements.
-
Who developed the CRAMM method?
UK Security Service+
ISACA
-
active audit is...
study of means to determine compliance with their solutions to information security problems)
study the state of the network protection system, the use of which helps a hacker to penetrate the network and cause damage to the company)
study of the state of security of an information system from the point of view of a hacker (or some attacker who is highly qualified in the field of information technology)+
-
Significant loss of tangible assets or significant damage to the company's reputation"
Minor
Moderate
Medium+
high
-
Specify the distribution kit that is used for penetration testing in various web applications
Samurai Web Security
Framework Santoku Linux
DEFT Linux
Network Security Toolkit
-
A computer program, piece of code, or sequence of commands that uses a vulnerability to attack a system.
Exploit+
SQL injection
Debuggers
-
What are programs for finding errors in other programs, operating system kernels, SQL queries and other types of code
Debuggers+
SQL injection
Exploit
10.ISSAF ...........
describes the security assessment of firewalls, routers, antivirus systems and more+
focused on pentesting that organizations need, processing, storing and transmitting data about cardholders.
focused on pentesting that organizations need, processing, storing and transmitting data about cardholders.
-
What is the security distribution based on - Parrot Security OS?
Debian Linux.+
Ubuntu
ArchLinux.
Gentoo Linux
-
. is one of the first methods of
comprehensive testing of information security of an organization.. PCI DSS
OSSTM+M ISSAF
-
The probability of making an attack is approximately equal to 0.5)
Very low
Низкая
Medium+
-
What type of projects does SysTrust belong to?
TrustService Services
Security Services
15. At the last stage of the audit of
information security, recommendations are developed to improve the organizational and
technical support of protection at the enterprise. Such recommendations include various types of actions aimed at.
minimization of identified risks+
Risk Reduction
Risk avoidance
Changing the nature of the risk
-
The probability of an attack is quite low. Corresponds to the numerical probability interval [0.25, 0.5)
Very low
Low+
Medium
-
In which audit do experts model the actions of an “external” intruder?
external active audit+
internal active audit
-
How is the risk value determined?
Risk = (resource cost * probability of threat): magnitude of vulnerability+
Risk = (resource cost + probability of threat): magnitude of vulnerability
Risk = (resource
cost - probability of threat): magnitude of vulnerability
-
Choose an attack probability that matches the description "An attack will almost never be carried out.
Corresponds to the numerical interval of the probability [0, 0.25)"
Very low+
Low
(Medium)
-
When conducting what type of audit with the help of special software tools, the actions of an “internal” attacker are modeled)?
(external active audit)
(internal active audit)+
-
Choose the level of damage suitable for the description "Minor losses of material assets that are quickly restored, or minor consequences for the reputation of the company")
(Minor) +
(Moderate)
(Medium)
(high)
-
Kali Linux formerly known as.
BackTrack+
Wireshark Armitage
Aircrack
-
(Noticeable loss of tangible assets or moderate impact on the company's reputation")
Minor)
(Moderate) +
(Medium)
(high)
-
(Large loss of tangible assets and great damage to the company's reputation")
Малый (Minor) Умеренный (Moderate) Средней тяжести (Medium)
Большой (high)+
-
(How is the risk value calculated?)
Риск (a) = P(a) × Ущерб (a).+
Риск (a) = Pиск(a) × Ущерб (a). Риск (a) = P(a) + Ущерб (a).
Риск (a) = P(a) / Ущерб (a).
-
(The attack will almost certainly be carried out. Corresponds to the numerical probability interval (0.75, 1])
Очень низкая (Very low)
Низкая (low)
Средняя (Medium) Высокая (High)
Очень
высокая (Very high)+
-
The attack is likely to be carried out. Corresponds to the numerical probability interval (0.5, 0.75]
Очень низкая (Very low) Низкая (low)
Средняя (Medium) +
Высокая (High)
-
(How many penetration testing utilities does Kali Linux contain?)
более чем из 600 security-утилит+
1359
16
64
-
Specify a standard that allows financial auditors to expand the scope of their activities by using a simple and understandable set of requirements for assessing the reliability and security of IS.)
SysTrust+
BSI\IT Baseline Protection Manual
ISO 17799: Code of Practice for Information Security Management
ISO 15408: Common Criteria for Information Technology Security Evaluation
30. focused on
pentesting that organizations need, processing, storing and transmitting data about cardholders.)
PCI DSS+
OSSTMM ISSAF
MIDTERM
-
Which organization is the world leader in harmonizing and centralizing IT control practices? Какая организация является мировым лидером по гармонизации и централизации практических стандартов в области контроля за ИТ?
ISACA+ IEEE ISO
-
What is the main difference between strategic IT audit and other types of IT audit? В чем состоит главное отличие стратегического ИТ -аудита от других видов ИТ- аудита?
necessarily includes an assessment of TCO by the company's information systems (обязательно включает оценку ССВ информационными системами компании)
The ultimate goal of a strategic IT audit is to identify the reasons for the discomfort of the top management of the organization in connection with the use of IT. (конечной целью стратегического И - аудита является идентификация причин дискомфорта высшего руководства
организации в связи с использованием ИТ)+
a consulting company is required to conduct a strategic IT audit (для проведения стратегического и - аудита обязательно привлекается консалтинговая компания)
- 1 2 3