CIST 1601 Cybersecurity Essentials Final Quiz Solution
CIST 1601 Cybersecurity Essentials
Final Quiz
Due No due date Points 100 Questions 50 Time
... [Show More] Limit 60 Minutes
Allowed Attempts 2
Instrucons
Aempt History
Attempt Time Score
LATEST Attempt 1 26 minutes 100 out of 100
Score for this attempt: 100 out of 100
Submitted Jun 21 at 11:10am
This attempt took 26 minutes.
This quiz covers all of the content in Cybersecurity Essentials 1.1. It is designed to test the skills and
knowledge presented in the course.
There are multiple task types that may be available in this quiz.
NOTE: Quizzes allow for partial credit scoring on all item types to foster learning. Points on quizzes can
also be deducted for answering incorrectly.
Forms 32901 - 23908
Take the Quiz Again
Ques 2 / 2 pts tion 1
Technologies like GIS and IoE contribute to the growth of large data stores.
What are two reasons that these technologies increase the need for
cybersecurity specialists? (Choose two.)
They require 24-hour monitoring. They require more equipment.
They collect sensitive information. Correct!
6/21/2018 Final Quiz: CIST 1601 Cybersecurity Essentials
https://1389888.netacad.com/courses/632394/quizzes/5585347 2/31 They make systems more complicated.
They contain personal information. Correct!
They increase processing requirements.
Refer to curriculum topic: 1.1.1
The types of information collected by these technologies have
increased the need for data protection.
Ques 2 / 2 pts tion 2
Which type of cybercriminal is the most likely to create malware to
compromise an organization by stealing credit card information?
black hat hackers Correct!
script kiddies white hat hackers gray hat hackers
Refer to curriculum topic: 1.2.1
Malware is a tool used by certain types of hackers to steal
information.
Ques 2 / 2 pts tion 3
Which statement best describes a motivation of hacktivists?
6/21/2018 Final Quiz: CIST 1601 Cybersecurity Essentials
https://1389888.netacad.com/courses/632394/quizzes/5585347 3/31
They are part of a protest group behind a political cause. Correct!
They are trying to show off their hacking skills. They are interested in discovering new exploits. They are curious and learning hacking skills.
Refer to curriculum topic: 1.2.1
Each type of cybercriminal has a distinct motivation for his or her
actions.
Ques 2 / 2 pts tion 4
Which methods can be used to implement multifactor authentication?
passwords and fingerprints Correct!
VPNs and VLANs tokens and hashes IDS and IPS
Refer to curriculum topic: 2.2.1
A cybersecurity specialist must be aware of the technologies available
that support the CIA triad.
Ques 2 / 2 pts tion 5
6/21/2018 Final Quiz: CIST 1601 Cybersecurity Essentials
https://1389888.netacad.com/courses/632394/quizzes/5585347 4/31
Which technology can be implemented as part of an authentication system to
verify the identification of employees?
a smart card reader Correct!
SHA-1 hash a virtual fingerprint a Mantrap
Refer to curriculum topic: 2.2.1
A cybersecurity specialist must be aware of the technologies available
that support the CIA triad.
Ques 2 / 2 pts tion 6
What are three states of data during which data is vulnerable? (Choose
three.)
data in-process Correct!
data decrypted purged data
data in-transit Correct!
stored data Correct!
data encrypted
6/21/2018 Final Quiz: CIST 1601 Cybersecurity Essentials
https://1389888.netacad.com/courses/632394/quizzes/5585347 5/31
Refer to curriculum topic: 2.3.1
A cybersecurity specialist must be aware of each of the three states of
data to effectively protect data and information. Purged data was
stored data. Encrypted and decrypted data can be in any of the three
states.
Ques 2 / 2 pts tion 7
A security specialist is asked for advice on a security measure to prevent
unauthorized hosts from accessing the home network of employees. Which
measure would be most effective?
Implement a VLAN. Implement RAID. Implement intrusion detection systems.
Implement a firewall. Correct!
Refer to curriculum topic: 2.4.1
Protecting data confidentiality requires an understanding of the
technologies used to protect data in all three data states.
Ques 2 / 2 pts tion 8
Which framework should be recommended for establishing a comprehensive
information security management system in an organization?
CIA Triad
6/21/2018 Final Quiz: CIST 1601 Cybersecurity Essentials
https://1389888.netacad.com/courses/632394/quizzes/5585347 6/31
ISO/IEC 27000 Correct!
NIST/NICE framework ISO OSI model
Refer to curriculum topic: 2.5.1
A cybersecurity specialist needs to be familiar with the different
frameworks and models for managing information security.
Q 2 / 2 pts uestion 9
What type of application attack occurs when data goes beyond the memory
areas allocated to the application?
RAM spoofing SQL injection
buffer overflow Correct!
RAM Injection
Refer to curriculum topic: 3.3.3
A cybersecurity specialist needs to be familiar with the characteristics
of the different types of malware and attacks that threaten an
organization.
Q 2 / 2 pts uestion 10
6/21/2018 Final Quiz: CIST 1601 Cybersecurity Essentials
https://1389888.netacad.com/courses/632394/quizzes/5585347 7/31
An executive manager went to an important meeting. The secretary in the
office receives a call from a person claiming that the executive manager is
about to give an important presentation but the presentation files are
corrupted. The caller sternly recommends that the secretary email the
presentation right away to a personal email address. The caller also states
that the executive is holding the secretary responsible for the success of this
presentation. Which type of social engineering tactic would describe this
scenario?
urgency
intimidation Correct!
familiarity trusted partners
Refer to curriculum topic: 3.2.1
Social engineering uses several different tactics to gain information
from victims.
Ques 2 / 2 pts tion 11
Users report that the network access is slow. After questioning the
employees, the network administrator learned that one employee
downloaded a third-party scanning program for the printer. What type of
malware might be introduced that causes slow performance of the network?
spam phishing virus
6/21/2018 Final Quiz: CIST 1601 Cybersecurity Essentials
https://1389888.netacad.com/courses/632394/quizzes/5585347 8/31
worm Correct!
Refer to curriculum topic: 3.1.1
A cybersecurity specialist needs to be familiar with the characteristics
of the different types of malware and attacks that threaten an
organization.
Ques 2 / 2 pts tion 12
What three best practices can help defend against social engineering
attacks? (Choose three.)
Deploy well-designed firewall appliances.
Do not provide password resets in a chat window.
Correct!
Resist the urge to click on enticing web links. Correct!
Enable a policy that states that the IT department should supply information
over the phone only to managers.
Add more security guards.
Educate employees regarding policies. Correct!
Refer to curriculum topic: 3.2.2
A cybersecurity specialist must be aware of the technologies and
measures that are used as countermeasures to protect the
organization from threats and vulnerabilities.
6/21/2018 Final Quiz: CIST 1601 Cybersecurity Essentials
https://1389888.netacad.com/courses/632394/quizzes/5585347 9/31
Ques 2 / 2 pts tion 13
A cyber criminal sends a series of maliciously formatted packets to the
database server. The server cannot parse the packets and the event causes
the server crash. What is the type of attack the cyber criminal launches?
packet Injection man-in-the-middle SQL injection
DoS Correct!
Refer to curriculum topic: 3.3.1
A cybersecurity specialist needs to be familiar with the characteristics
of the different types of malware and attacks that threaten an
organization.
Ques 2 / 2 pts tion 14
Which statement describes a distributed denial of service attack?"
An attacker views network traffic to learn authentication credentials.
One computer accepts data packets based on the MAC address of another
computer.
An attacker builds a botnet comprised of zombies. Correct!
An attacker sends an enormous quantity of data that a server cannot handle.
6/21/2018 Final Quiz: CIST 1601 Cybersecurity Essentials
https://1389888.netacad.com/courses/632394/quizzes/5585347 10/31
Refer to curriculum topic: 3.3.1
A cybersecurity specialist needs to be familiar with the characteristics
of the different types of malware and attacks that threaten an
organization.
Ques 2 / 2 pts tion 15
A penetration testing service hired by the company has reported that a
backdoor was identified on the network. What action should the organization
take to find out if systems have been compromised?
Look for usernames that do not have passwords.
Look for unauthorized accounts. Correct!
Scan the systems for viruses. Look for policy changes in Event Viewer.
Refer to curriculum topic: 3.1.1
A cybersecurity specialist needs to be familiar with the characteristics
of the different types of malware and attacks that threaten an
organization.
Q 2 / 2 pts uestion 16
Which access control strategy allows an object owner to determine whether
to allow access to the object?
MAC
6/21/2018 Final Quiz: CIST 1601 Cybersecurity Essentials
https://1389888.netacad.com/courses/632394/quizzes/5585347 11/31 ACL RBAC
DAC Correct!
Refer to curriculum topic: 4.2.2
Access control prevents unauthorized user from gaining access to
sensitive data and networked systems. There are several
technologies used to implement effective access control strategies.
Ques 2 / 2 pts tion 17
Alice and Bob are using public key encryption to exchange a message.
Which key should Alice use to encrypt a message to Bob?
the private key of Bob
the public key of Bob Correct!
the private key of Alice the public key of Alice
Refer to curriculum topic: 4.1.3
Encryption is an important technology used to protect confidentiality. It
is important to understand the characteristics of the various encryption
methodologies.
Ques 2 / 2 pts tion 18
6/21/2018 Final Quiz: CIST 1601 Cybersecurity Essentials
https://1389888.netacad.com/courses/632394/quizzes/5585347 12/31
An organization plans to implement security training to educate employees
about security policies. What type of access control is the organization trying
to implement?
administrative Correct!
technological physical logical
Refer to curriculum topic: 4.2.1
Access control prevents an unauthorized user from gaining access to
sensitive data and networked systems. There are several
technologies used to implement effective access control strategies.
Ques 2 / 2 pts tion 19
Smart cards and biometrics are considered to be what type of access
control?
logical Correct!
physical technological administrative
6/21/2018 Final Quiz: CIST 1601 Cybersecurity Essentials
https://1389888.netacad.com/courses/632394/quizzes/5585347 13/31
Refer to curriculum topic: 4.2.1
Access control prevents an unauthorized user from gaining access to
sensitive data and networked systems. There are several
technologies used to implement effective access control strategies.
Ques 2 / 2 pts tion 20
The IT department is tasked to implement a system that controls what a user
can and cannot do on the corporate network. Which process should be
implemented to meet the requirement?
user login auditing a biometric fingerprint reader
a set of attributes that describes user access rights Correct!
observations to be provided to all employees
Refer to curriculum topic: 4.2.5
Access control prevents unauthorized user from gaining access to
sensitive data and networked systems. There are several
technologies used to implement effective access control strategies.
Ques 2 / 2 pts tion 21
Alice and Bob use a pre-shared key to exchange a confidential message. If
Bob wants to send a confidential message to Carol, what key should he use?
the same pre-shared key he used with Alice
6/21/2018 Final Quiz: CIST 1601 Cybersecurity Essentials
https://1389888.netacad.com/courses/632394/quizzes/5585347 14/31
the private key of Carol the public key of Bob
a new pre-shared key Correct!
Refer to curriculum topic: 4.1.2
Encryption is an important technology used to protect confidentiality. It
is important to understand the characteristics of the various encryption
methodologies.
Q 2 / 2 pts uestion 22
What happens as the key length increases in an encryption application?
Keyspace decreases exponentially.
Keyspace increases proportionally.
Keyspace decreases proportionally.
Keyspace increases exponentially.
Correct!
Refer to curriculum topic: 4.1.4
Encryption is an important technology used to protect confidentiality. It
is important to understand the characteristics of the various encryption
methodologies.
Q 2 / 2 pts uestion 23
6/21/2018 Final Quiz: CIST 1601 Cybersecurity Essentials
https://1389888.netacad.com/courses/632394/quizzes/5585347 15/31
Which statement describes a characteristics of block ciphers?
Block ciphers result in compressed output. Block ciphers are faster than stream ciphers. Block ciphers encrypt plaintext one bit at a time to form a block.
Block ciphers result in output data that is larger than the input data most of the
time.
Correct!
Refer to curriculum topic: 4.1.2
Encryption is an important technology used to protect confidentiality. It
is important to understand the characteristics of the various encryption
methodologies.
Ques 2 / 2 pts tion 24
Alice and Bob are using a digital signature to sign a document. What key
should Alice use to sign the document so that Bob can make sure that the
document came from Alice?
private key from Bob
private key from Alice Correct!
username and password from Alice public key from Bob
6/21/2018 Final Quiz: CIST 1601 Cybersecurity Essentials
https://1389888.netacad.com/courses/632394/quizzes/5585347 16/31
Refer to curriculum topic: 5.2.2
Alice and Bob are used to explain asymmetric cryptography used in
digital signatures. Alice uses a private key to encrypt the message
digest. The message, encrypted message digest, and the public key
are used to create the signed document and prepare it for
transmission.
Ques 2 / 2 pts tion 25
You have been asked to implement a data integrity program to protect data
files that need to be electronically downloaded by the sales staff. You have
decided to use the strongest hashing algorithm available on your systems.
Which hash algorithm would you select?
MD5
SHA-256 Correct!
AES SHA-1
Refer to curriculum topic: 5.1.1
MD5 and SHA are the two most popular hashing algorithms. SHA-256
uses a 256-bit hash, whereas MD5 produces a 128-bit hash value.
Ques 2 / 2 pts tion 26
An organization just completed a security audit. Your division was cited for
not conforming to X.509 requirements. What is the first security control you
need to examine?
6/21/2018 Final Quiz: CIST 1601 Cybersecurity Essentials
https://1389888.netacad.com/courses/632394/quizzes/5585347 17/31
digital certificates Correct!
hashing operations VPNs and encryption services data validation rules
Refer to curriculum topic: 5.3.2
Digital certificates protect the parties involved in secure
communications.
Ques 2 / 2 pts tion 27
Your organization will be handling market trades. You will be required to
verify the identify of each customer who is executing a transaction. Which
technology should be implemented to authenticate and verify customer
electronic transactions?
symmetrical encryption asymmetrical encryption
digital certificates Correct!
data hashing
Refer to curriculum topic: 5.3.1
Digital certificates protect the parties involved in secure
communications.
6/21/2018 Final Quiz: CIST 1601 Cybersecurity Essentials
https://1389888.netacad.com/courses/632394/quizzes/5585347 18/31
Ques 2 / 2 pts tion 28
What technique creates different hashes for the same password?
CRC HMAC SHA-256
salting Correct!
Refer to curriculum topic: 5.1.2
Data integrity is one of the three guiding security principles. A
cybersecurity specialist should be familiar with the tools and
technologies used ensure data integrity.
Ques 2 / 2 pts tion 29
The X.509 standards defines which security technology?
digital certificates Correct!
security tokens strong passwords biometrics
6/21/2018 Final Quiz: CIST 1601 Cybersecurity Essentials
https://1389888.netacad.com/courses/632394/quizzes/5585347 19/31
Refer to curriculum topic: 5.3.2
Digital certificates protect the parties involved in a secure
communication
Ques 2 / 2 pts tion 30
What is a feature of a cryptographic hash function?
The hash function is a one-way mathematical function. Correct!
Hashing requires a public and a private key.
The hash input can be calculated given the output value. The output has a variable length.
Refer to curriculum topic: 5.1.1
Data integrity is one of the three guiding security principles. A
cybersecurity specialist should be familiar with the tools and
technologies used to ensure data integrity.
Ques 2 / 2 pts tion 31
Technicians are testing the security of an authentication system that uses
passwords. When a technician examines the password tables, the technician
discovers the passwords are stored as hash values. However, after
comparing a simple password hash, the technician then discovers that the
values are different from those on other systems. What are two causes of
this situation? (Choose two.)
6/21/2018 Final Quiz: CIST 1601 Cybersecurity Essentials
https://1389888.netacad.com/courses/632394/quizzes/5585347 20/31
One system uses hashing and the other uses hashing and salting. Correct!
Both systems use MD5.
The systems use different hashing algorithms. Correct!
Both systems scramble the passwords before hashing.
One system uses symmetrical hashing and the other uses asymmetrical
hashing.
Refer to curriculum topic: 5.1.2
Hashing can be used in many different situations to ensure data
integrity.
Ques 2 / 2 pts tion 32
Which risk mitigation strategies include outsourcing services and purchasing
insurance?
transfer Correct!
reduction acceptance avoidance
6/21/2018 Final Quiz: CIST 1601 Cybersecurity Essentials
https://1389888.netacad.com/courses/632394/quizzes/5585347 21/31
Refer to curriculum topic: 6.2.1
Risk mitigation lessens the exposure of an organization to threats and
vulnerabilities by transferring, accepting, avoiding, or taking an action
to reduce risk.
Ques 2 / 2 pts tion 33
Which two values are required to calculate annual loss expectancy? (Choose
two.)
exposure factor
single loss expectancy Correct!
frequency factor quantitative loss value asset value
annual rate of occurrence Correct!
Refer to curriculum topic: 6.2.1
Single loss expectancy, annualized rate of occurrence, and
annualized loss expectancy are used in a quantitative risk analysis
Ques 2 / 2 pts tion 34
Your risk manager just distributed a chart that uses three colors to identify
the level of threat to key assets in the information security systems. Red
represents high level of risk, yellow represents average level of threat and
6/21/2018 Final Quiz: CIST 1601 Cybersecurity Essentials
https://1389888.netacad.com/courses/632394/quizzes/5585347 22/31
green represents low level of threat. What type of risk analysis does this
chart represent?
loss analysis exposure factor analysis quantitative analysis
qualitative analysis Correct!
Refer to curriculum topic: 6.2.1
A quantitative or qualitative risk analysis is used to identify and
prioritize threats to the organization.
Ques 2 / 2 pts tion 35
The team is in the process of performing a risk analysis on the database
services. The information collected includes the initial value of these assets,
the threats to the assets and the impact of the threats. What type of risk
analysis is the team performing by calculating the annual loss expectancy?
loss analysis qualitative analysis
quantitative analysis Correct!
protection analysis
6/21/2018 Final Quiz: CIST 1601 Cybersecurity Essentials
https://1389888.netacad.com/courses/632394/quizzes/5585347 23/31
Refer to curriculum topic: 6.2.1
A qualitative or quantitative risk analysis is used to identify and
prioritize threats to the organization.
Ques 2 / 2 pts tion 36
What is it called when an organization only installs applications that meet its
guidelines, and administrators increase security by eliminating all other
applications?
asset availability asset identification
asset standardization Correct!
asset classification
Refer to curriculum topic: 6.2.1
An organization needs to know what hardware and software are
present as a prerequisite to knowing what the configuration
parameters need to be. Asset management includes a complete
inventory of hardware and software. Asset standards identify specific
hardware and software products that the organization uses and
supports. When a failure occurs, prompt action helps to maintain both
access and security.
Ques 2 / 2 pts tion 37
What approach to availability provides the most comprehensive protection
because multiple defenses coordinate together to prevent attacks?
6/21/2018 Final Quiz: CIST 1601 Cybersecurity Essentials
https://1389888.netacad.com/courses/632394/quizzes/5585347 24/31 diversity
layering Correct!
obscurity limiting
Refer to curriculum topic: 6.2.2
Defense in depth utilizes multiple layers of security controls.
Ques 2 / 2 pts tion 38
What are two incident response phases? (Choose two.)
containment and recovery Correct!
prevention and containment
detection and analysis Correct!
mitigation and acceptance risk analysis and high availability confidentiality and eradication
Refer to curriculum topic: 6.3.1
When an incident occurs, the organization must know how to respond.
An organization needs to develop an incident response plan that
includes several phases.
6/21/2018 Final Quiz: CIST 1601 Cybersecurity Essentials
https://1389888.netacad.com/courses/632394/quizzes/5585347 25/31
Ques 2 / 2 pts tion 39
An organization has recently adopted a five nines program for two critical
database servers. What type of controls will this involve?
improving reliability and uptime of the servers Correct!
remote access to thousands of external users limiting access to the data on these systems stronger encryption systems
Refer to curriculum topic: 6.1.1
System and data availability is a critical responsibility of a
cybersecurity specialists. It is important to understand the
technologies, process, and controls used to provide high availability.
Ques 2 / 2 pts tion 40
What approach to availability involves using file permissions?
limiting Correct!
simplicity layering obscurity
6/21/2018 Final Quiz: CIST 1601 Cybersecurity Essentials
https://1389888.netacad.com/courses/632394/quizzes/5585347 26/31
Refer to curriculum topic: 6.2.2
System and data availability is a critical responsibility of a
cybersecurity specialist. It is important to understand the technologies,
process, and controls used to protect provide high availability.
Ques 2 / 2 pts tion 41
Which utility uses the Internet Control Messaging Protocol (ICMP)?
ping Correct!
NTP RIP DNS
Refer to curriculum topic: 7.3.1
ICMP is used by network devices to send error messages.
Ques 2 / 2 pts tion 42
What describes the protection provided by a fence that is 1 meter in height?
It deters casual trespassers only.
Correct!
It offers limited delay to a determined intruder.
The fence deters determined intruders.
6/21/2018 Final Quiz: CIST 1601 Cybersecurity Essentials
https://1389888.netacad.com/courses/632394/quizzes/5585347 27/31 It prevents casual trespassers because of its height.
Refer to curriculum topic: 7.4.1
Security standards have been developed to assist organizations in
implementing the proper controls to mitigate potential threats. The
height of a fence determines the level of protection from intruders
Ques 2 / 2 pts tion 43
Which technology can be used to protect VoIP against eavesdropping?
ARP strong authentication
encrypted voice messages Correct!
SSH
Refer to curriculum topic: 7.3.2
Many advanced technologies such as VoIP, streaming video, and
electronic conferencing require advanced countermeasures.
Ques 2 / 2 pts tion 44
What Windows utility should be used to configure password rules and
account lockout policies on a system that is not part of a domain?
Event Viewer security log
6/21/2018 Final Quiz: CIST 1601 Cybersecurity Essentials
https://1389888.netacad.com/courses/632394/quizzes/5585347 28/31
Local Security Policy tool Correct!
Computer Management Active Directory Security tool
Refer to curriculum topic: 7.2.2
A cybersecurity specialist must be aware of the technologies and
measures that are used as countermeasures to protect the
organization from threats and vulnerabilities. Local Security Policy,
Event Viewer, and Computer Management are Windows utilities that
are all used in the security equation.
Q 2 / 2 pts uestion 45
Which protocol would be used to provide security for employees that access
systems remotely from home?
Telnet SCP
SSH Correct!
WPA
Refer to curriculum topic: 7.2.1
Various application layer protocols are used to for communications
between systems. A secure protocol provides a secure channel over
an unsecured network.
6/21/2018 Final Quiz: CIST 1601 Cybersecurity Essentials
https://1389888.netacad.com/courses/632394/quizzes/5585347 29/31
Ques 2 / 2 pts tion 46
Mutual authentication can prevent which type of attack?
man-in-the-middle Correct!
wireless poisoning wireless sniffing wireless IP spoofing
Refer to curriculum topic: 7.1.2
A cybersecurity specialist must be aware of the technologies and
measures that are used as countermeasures to protect the
organization from threats and vulnerabilities.
Ques 2 / 2 pts tion 47
Which two protocols pose switching threats? (Choose two.)
WPA2
ARP Correct!
ICMP IP RIP
STP Correct!
6/21/2018 Final Quiz: CIST 1601 Cybersecurity Essentials
https://1389888.netacad.com/courses/632394/quizzes/5585347 30/31
Refer to curriculum topic: 7.3.1
Network switches are the heart of the modern data communication
network. The main threats to network switches are theft, hacking and
remote access, and attacks against network protocols.
Ques 2 / 2 pts tion 48
Which cybersecurity weapon scans for use of default passwords, missing
patches, open ports, misconfigurations, and active IP addresses?
packet sniffers packet analyzers
vulnerability scanners Correct!
password crackers
Refer to curriculum topic: 8.2.4
There are many tools that a cybersecurity specialist uses to evaluate
the potential vulnerabilities of an organization.
Ques 2 / 2 pts tion 49
Which website offers guidance on putting together a checklist to provide
guidance on configuring and hardening operating systems?
CERT
The National Vulnerability Database website Correct!
6/21/2018 Final Quiz: CIST 1601 Cybersecurity Essentials
https://1389888.netacad.com/courses/632394/quizzes/5585347 31/31
Internet Storm Center The Advanced Cyber Security Center
Refer to curriculum topic: 8.2.3
There are several cybersecurity information websites that a
cybersecurity specialist uses to evaluate the potential vulnerabilities of
an organization. Some of these websites are the National Vulnerability
Database, CERT, the Internet Storm Center, and the Advanced Cyber
Security Center.
Q 2 / 2 pts uestion 50
Which threat is mitigated through user awareness training and tying security
awareness to performance reviews?
user-related threats Correct!
device-related threats cloud-related threats physical threats
Refer to curriculum topic: 8.1.1
Cybersecurity domains provide a framework for evaluating and
implementing controls to protect the assets of an organization. Each
domain has various countermeasures available to manage threats.
Quiz Score: 100 out of 100 [Show Less]