blog

CMGT 430, Week 3 Quiz

CMGT 430, Week 3 Quiz

Instructions:  Please respond to the following questions.  There is no required answer length.  However, be sure to adequately answer each question.  Each question is worth one point.

 

Q 1: Describe each link in the Cyber Kill Chain.

 

 

 

Q 2:  Describe three common types of cyber-security attacks.  How might you defend against each.

 

 

 

Q 3:  Describe how an organization can use log files as a security control.

 

 

 

Q 4:  Describe the process of vulnerability management.  How does it differ from penetration testing?

 

 

 

Q 5How can an organization use a honeypot in its threat modeling activities?

 

Is this the question you were looking for? If so, place your order here to get started!

×