CMGT 430, Week 3 Quiz
Instructions: Please respond to the following questions. There is no required answer length. However, be sure to adequately answer each question. Each question is worth one point.
Q 1: Describe each link in the Cyber Kill Chain.
Q 2: Describe three common types of cyber-security attacks. How might you defend against each.
Q 3: Describe how an organization can use log files as a security control.
Q 4: Describe the process of vulnerability management. How does it differ from penetration testing?
Q 5. How can an organization use a honeypot in its threat modeling activities?
Is this the question you were looking for? If so, place your order here to get started!