CIS 359 STUDY Extraordinary Success /cis359study.com CIS 359 STUDY Extraordinary Success /cis359study.c | Page 31
•
Question 15
The Southeast Collegiate Cyber Defense Competition is unique in that
it focuses on the operational aspect of managing and protecting an
existing network infrastructure. Unlike “capture-the-flag ” exercises,
this competition is exclusively a real-world ____ competition.
•
Question 16
The U.S. National Institute of Standards and Technology recommends
a set of tools for the CSIRT including incident reporting mechanisms
with which users can report suspected incidents. At least one of these
mechanisms should permit people to report incidents ____.
•
Question 17
The training delivery method with the lowest cost to the organization
is ____.
•
Question 18
A(n) ____ is the set of rules and configuration guidelines governing
the implementation and operation of IDPSs within the organization.
•
Question 19
A(n) ____ is any system resource that is placed onto a functional
system but has no normal use for that system. If it attracts attention, it
is from unauthorized access and will trigger a notification or response.
•
Question 20
The use of IDPS sensors and analysis systems can be quite complex.
One very common approach is to use an open source software
program called ____ running on an open source UNIX or Linux
system that can be managed and queried from a desktop computer
using a client interface.
•
Question 21