ISC CC - CC - Certified in Cybersecurity
The practice of ensuring that an organizational process cannot be completed by a single person; forces collusion as a means to reduce insider threats.
Juli is listening to network traffic and capturing passwords as they are sent to the authentication server. She plans to use the passwords as part of a future attack. What type of attack is this?
Type of cyber attack carried out over a LAN that involves sending malicious packets to a default gateway on a LAN
Which is a curated knowledge base and model for cyber adversary behavior, reflecting the various phases of an adversary's attack lifecycle and the platforms they are known to target
A Hacker launched a specific attack to exploit a known system vulnerability. What term best describes this situation?
Which document serve as specifications for the implementation of policy and dictates mandatory requirements
Which protocol would be most suitable to fulfill the secure communication requirements between clients and the server for a company deploying a new application?
A one-way spinning door or barrier that allows only one person at a time to enter a building or pass through an area.
Which type of attack takes advantage of vulnerabilities in validation?
The means by which a threat actor carries out their objectives