{"id":119498,"date":"2023-09-10T19:31:30","date_gmt":"2023-09-10T19:31:30","guid":{"rendered":"https:\/\/learnexams.com\/blog\/?p=119498"},"modified":"2023-09-10T19:31:33","modified_gmt":"2023-09-10T19:31:33","slug":"wgu-c842-cyber-defense-and-counter-measures-exam-study-bundle-2023-2024-complete-packageverified-wgu-c842-cyber-defense-and-counter-measures-exam-study-bundle-2023-2024-complete-packageveri","status":"publish","type":"post","link":"https:\/\/www.learnexams.com\/blog\/2023\/09\/10\/wgu-c842-cyber-defense-and-counter-measures-exam-study-bundle-2023-2024-complete-packageverified-wgu-c842-cyber-defense-and-counter-measures-exam-study-bundle-2023-2024-complete-packageveri\/","title":{"rendered":"WGU C842 Cyber Defense and Counter Measures EXAM STUDY BUNDLE 2023 &#8211; 2024 (COMPLETE PACKAGE)(Verified)"},"content":{"rendered":"\n<p id=\"content-description\">WGU C842 Cyber Defense and Counter Measures EXAM STUDY BUNDLE 2023 &#8211; 2024 (COMPLETE PACKAGE)(Verified)<\/p>\n\n\n\n<p>1 \/ 15<br>C842 Cyber Defense and Counter measures EC Council CertifiedIncident Handler CIH Tools and Commands<br>1.PILAR: Risk analysis and Management tool<br>2.Pilar: Assess risk against critical assets. Qualitative and quantitative.<br>Generate risk assessment reports<br>3.Group Policy Management console: Security policy Tools<br>4.Manageengine \u2026 plus: Ticketing system Tools<br>5.Alien vault: Ticketing system Tools<br>6.Busk-security: Incident analysis and validation Tools<br>7.Busk-security: Collection of security checks for Linux. Identify securitystatus.<br>8.kiwi syslog: Incident analysis and validation Tools<br>9.Splunk light: Incident analysis and validation Tools<br>10.kiwi syslog: message Management tool across servers and network<\/p>\n\n\n\n<p>2 \/ 15<br>devices. Syslog messages, SNMP traps, event log, real time<br>11.Splunk light: Collecting monitoring analyzing low from servers<br>applications and other sources.<br>12.Microsoft Baseline Security Analyzer (MBSA): Tools for detecting<br>missing security patches<br>13.Microsoft Baseline Security Analyzer (MBSA): Determine security<br>State. Scan for missing patches and misconfigs.<br>14.Magic tree: Report writing tools<br>15.Keepnote: Report writing tools<br>16.FTK\u2026: Data Imaging Tools<br>17.FTK Imager: data preview and imaging tool that enables analysis of<br>files and folders on local hard drives, CDs\/DVDs, network drives, and<br>examination of the content of forensic images or memory dumps<br>18.R-Drive\u2026: Data Imaging Tools<br>19.R-Drive\u2026: provides creation of disk image files for backup or<br>duplication purposes. restores the images on the original disks, on<br>any other partitions, or even on a hard drive&#8217;s free space. one can<\/p>\n\n\n\n<p>3 \/ 15<br>restore the system after heavy data loss caused by an operating<br>system crash, virus attack, or hardware failure<br>20.\u00b7 EnCase Forensic<br>Data Acquisition<br>Toolbox<br>\u00b7 RAID Recovery for Windows<\/p>\n\n\n\n<p>4 \/ 15<br>\u00b7 R-Tools R-Studio<br>F-Response Imager: Data Imaging Tools<br>21.HashCalc: Image Integrity Tools<br>22.HashCalc: compute multiple hashes, checksums, and HMACs for<br>files, text, and hex strings.<br>23.MD5 Calculator: Image Integrity Tools<br>24.MD5 Calculator: calculating the MD5 hash value of the selected file<br>25.HashMyFiles: Image Integrity Tools<br>26.HashMyFiles: small utility that allows to calculate the MD5 and<br>SHA1 hashes of one or more files in the system. It allows copying of<br>the MD5\/SHA1 hashes list into the clipboard or save them into<br>text\/html\/xml file<br>27.PsUptime (Windows): \u00b7 Shows system uptime<br>28.Net Statistics (Windows): \u00b7 Shows system uptime<br>29.Uptime and W (Linux): \u00b7 Shows system uptime<br>30.Netstat -ab (Windows): determine all the executable files for running<br>process- es<\/p>\n\n\n\n<p>1 \/<br>107<br>WGU C842 \u2013 Cyber Defense and Counter Measures<br>TEST BANK 2023<br>1.Which of the following information security elements ensures that the<br>information is accessible only to those who are authorized to have<br>access?<br>A authenticity<br>B confidentiality<br>C integrity<br>D availability: B<br>2.Identify the information security element that determines<br>trustworthiness of data or resources in terms of preventing improper and<br>unauthorized changes.<br>A integrity<br>B availability<br>C authenticity<br>D non-repudiation: A<br>3.John, a security professional working for Xdoc Corporation, is imple-<\/p>\n\n\n\n<p>2 \/<br>107<br>menting a security strategy that uses multilayered protection throughout<br>an information system to help minimize any adverse impact from attacks<br>on organizational assets.<br>Identify the security strategy John has implemented.<br>A covert channel<br>B defense-in-depth<br>C likelihood analysis<br>D three-way handshake: B<br>4.Identify the security policy that doesn&#8217;t keep any restrictions on the<br>usage of system resources.<br>A promiscuous policy<br>B prudent policy<br>C paranoid policy<br>D permissive policy: A<br>5.Carl is trying to violate the acceptable use of a network and computer<br>use policy. Under which category of the incident handling criteria does<br>this scenario fall?<\/p>\n\n\n\n<p>3 \/<br>107<br>A CAT 4<br>B CAT 2<br>C CAT 1<br>D CAT 3: A<br>6.In which of the following stages of incident handling does<br>classification and prioritization of incidents take place?<br>A incident recording and assignment<br>B incident containment<br>C post-incident activities<br>D incident triage: D<br>7.Which of the following terms reflects an organization&#8217;s mid-term<br>and long-term goals for incident management capabilities?<br>A IH&amp;R team models<br>B IH&amp;R mission<br>C IH&amp;R staffing<br>D IH&amp;R vision: D<br>8.Which of the following terms defines the purpose and scope of the<br>planned incident handling and response capabilities?<\/p>\n\n\n\n<p>4 \/<br>107<br>A IH&amp;R mission<br>B IH&amp;R staffing<br>C IH&amp;R team models<br>D IH&amp;R vision: A<br>9.Which of the following backup strategies provides daily status of the<br>backup situation, such as successful, unsuccessful, not run, out of<br>space, etc.?<br>A security<br>B guarantee<br>C data availability<br>D notifications: D<br>10.John is an incident response manager at XYZ Inc. As a part of IH&amp;R<br>policy of his organization, he signed a contract between the organization<br>and a third-party insurer to protect organization individuals from different<br>threats<\/p>\n\n\n\n<p>1 \/<br>Cyber Defense and Counter measures &#8211; C842<br>1.ISO\/IEC 27001:2013: Requirements for establishing, implementing,<br>maintain- ing and continually improving an information security<br>management system<br>2.ISO\/IEC 27002: Guidelines for organizational information security<br>standards and information security management practices<br>3.ISO\/IEC 27035: Defines recommendations and best practices for<br>developing an efficient incident management plan.<br>4.FIPS (Federal Information Processing Standards) 200: Defines<br>computer systems usage for the US federal government.<br>5.NIST Special Publication 800 Series: information regarding computer<br>security: best practices, guidelines, recommendations, technical<br>details, and annual reports of NIST&#8217;s cybersecurity activities.<br>6.NERC 1300 Cyber Security: Standard to reduce risks to the reliability<\/p>\n\n\n\n<p>2 \/<br>of bulk electric systems from any compromise of their critical cyber<br>assets<br>7.RFC 2196: Computer security policies and procedures for sites that<br>have sys- tems on the internet.<br>8.CIS Critical Security Controls: Actions that form a defense-in-depth<br>set of practices that mitigate common attacks against systems \/<br>networks.<br>9.Sarbanes-Oxley Act (SOX): Protects investors and public by<br>increasing accu- racy \/ reliability of corporate disclosures<br>10.Health Insurance Portability and Accountability Act (HIPAA):<br>Protections for individually identifiable health information<br>11.Federal Information Security Management Act (FISMA): Framework for<br>ensuring effectiveness of InfoSec controls over information resources<br>that support federal operations and assets.<br>12.Gramm-Leach-Bliley Act (GLBA): Financial companies required to<br>explain information-sharing practices to customers &amp; safeguard<br>sensitive data<br>13.Data Protection Act 2018: Provisions for GDPR<\/p>\n\n\n\n<p>1 \/ 10<br>WGU C842 OBJECTIVE ASSESSMENT 2023<br>1.A security committee at an organization develops a security plan.<br>Numer- ous security control types are in place. The organization utilizes a<br>training program to provide best practices training to all employees. The<br>committee uses which category to define the program ANS Operational<br>2.Too often, employees use the datacenter for overflow storage of office<br>sup- plies. Management uses warning signs to prevent employees from<br>entering a datacenter. Management has implemented which control type to<br>tighten security ANS Physical<br>3.It is important to assess sources when adding information to a data<br>set. Considering threat intelligence, this data is likely to derive from<br>external sources. Which factor is key in disseminating updates ANS<br>Relevancy<br>4.Numerous energy companies experience cyber attacks in a short period<br>of time. Analysts that investigate the attacks categorize the threats as<br>coming from which actor type ANS Nation-state<\/p>\n\n\n\n<p>2 \/ 10<br>5.A company abruptly terminates an employee. The employee harbors a<br>known grievance as a result of the company&#8217;s actions. Considering<br>threat types, which two classify the ex-employee? Select all that apply<br>ANS Insider Outsider<br>6.Engineers analyze previous hacks and intrusions to produce definitions<br>of the tactics, techniques, and procedures (TTP) used to perform attacks.<br>When evaluating data, the engineers classify which attack based on the<br>behavior of increased network traffic ANS Data exfiltration<br>7.Threat intelligence reveals a new type of malware is infecting Windows<br>desktops in many companies. Security specialists at a company initiate<br>threat hunting activities to investigate a potential infection. Which areas<br>do the engineers investigate in implementing the hunt? Select all that<br>apply ANS &#8211; Network traffic<br>Process Lists<br>8.A systems engineer at an organization tightens security by enabling<br>sandboxing on a crucial system. This measure is in place to help prevent<br>ransomware. Which valid features does the engineer enable on the<br>system? Select all that apply ANS Monitor network sockets<br>Periodic snapshots<\/p>\n\n\n\n<p>3 \/ 10<br>9.In contrast to traditional packet sniffing, Zeek, a packet capture tool,<br>offers which benefits? Select all that apply ANS Log only data of potential<br>interests Reduce storage requirements<\/p>\n\n\n\n<p>1 \/ 25<br>WGU C842 \u2013 Cyber Defense and Counter Measures TEST<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Which of the following information security elements ensures that the<br>information is accessible only to those who are authorized to have<br>access?<br>A authenticity<br>B confidentiality<br>C integrity<br>D availability ANS : B<\/li>\n\n\n\n<li>Identify the information security element that determines<br>trustworthiness of data or resources in terms of preventing improper and<br>unauthorized changes.<br>A integrity<br>B availability<br>C authenticity<br>D non-repudiation ANS : A<\/li>\n\n\n\n<li>John, a security professional working for Xdoc Corporation, is implementing a security strategy that uses multilayered protection throughout<br>an information system to help minimize any adverse impact from attacks<\/li>\n<\/ol>\n\n\n\n<p>2 \/ 25<br>on organizational assets.<br>Identify the security strategy John has implemented.<br>A covert channel<br>B defense-in-depth<br>C likelihood analysis<br>D three-way handshake ANS : B<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"4\">\n<li>Identify the security policy that doesn&#8217;t keep any restrictions on the<br>usage of system resources.<br>A promiscuous<br>policy B prudent<br>policy<br>C paranoid policy<br>D permissive policy ANS : A<\/li>\n\n\n\n<li>Carl is trying to violate the acceptable use of a network and computer<br>use policy. Under which category of the incident handling criteria does<br>this scenario fall?<\/li>\n<\/ol>\n\n\n\n<p>3 \/ 25<br>A CAT 4<br>B CAT 2<br>C CAT 1<br>D CAT 3 ANS : A<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"6\">\n<li>In which of the following stages of incident handling does<br>classification and prioritization of incidents take place?<br>A incident recording and<br>assignment B incident containment<br>C post-incident activities<br>D incident triage ANS : D<\/li>\n\n\n\n<li>Which of the following terms reflects an organization&#8217;s mid-term<br>and long-term goals for incident management capabilities?<br>A IH&amp;R team models<br>B IH&amp;R mission<br>C IH&amp;R staffing<br>D IH&amp;R vision<br>ANS : D<\/li>\n\n\n\n<li>Which of the following terms defines the purpose and scope of the<br>planned incident handling and response capabilities?<\/li>\n<\/ol>\n\n\n\n<p>4 \/ 25<br>A IH&amp;R mission<br>B IH&amp;R staffing<br>C IH&amp;R team models<br>D IH&amp;R vision ANS :<br>A<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"9\">\n<li>Which of the following backup strategies provides daily status of the<br>backup situation, such as successful, unsuccessful, not run, out of<br>space, etc.?<br>A security<br>B guarantee<br>C data<br>availability D<br>notifications ANS<br>: D<\/li>\n\n\n\n<li>John is an incident response manager at XYZ Inc. As a part of IH&amp;R<br>policy of his organization, he signed a contract between the organization<br>and a third-party insurer to protect organization individuals from different<br>threats and risks.<\/li>\n<\/ol>\n\n\n\n<p>1 \/ 25<br>WGU C842 \u2013 Cyber Defense and Counter Measures TEST<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Which of the following information security elements ensures that the<br>information is accessible only to those who are authorized to have<br>access?<br>A authenticity<br>B confidentiality<br>C integrity<br>D availability ANS : B<\/li>\n\n\n\n<li>Identify the information security element that determines<br>trustworthiness of data or resources in terms of preventing improper and<br>unauthorized changes.<br>A integrity<br>B availability<br>C authenticity<br>D non-repudiation ANS : A<\/li>\n\n\n\n<li>John, a security professional working for Xdoc Corporation, is implementing a security strategy that uses multilayered protection throughout<br>an information system to help minimize any adverse impact from attacks<\/li>\n<\/ol>\n\n\n\n<p>2 \/ 25<br>on organizational assets.<br>Identify the security strategy John has implemented.<br>A covert channel<br>B defense-in-depth<br>C likelihood analysis<br>D three-way handshake ANS : B<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"4\">\n<li>Identify the security policy that doesn&#8217;t keep any restrictions on the<br>usage of system resources.<br>A promiscuous<br>policy B prudent<br>policy<br>C paranoid policy<br>D permissive policy ANS : A<\/li>\n\n\n\n<li>Carl is trying to violate the acceptable use of a network and computer<br>use policy. Under which category of the incident handling criteria does<br>this scenario fall?<\/li>\n<\/ol>\n\n\n\n<p>3 \/ 25<br>A CAT 4<br>B CAT 2<br>C CAT 1<br>D CAT 3 ANS : A<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"6\">\n<li>In which of the following stages of incident handling does<br>classification and prioritization of incidents take place?<br>A incident recording and<br>assignment B incident containment<br>C post-incident activities<br>D incident triage ANS : D<\/li>\n\n\n\n<li>Which of the following terms reflects an organization&#8217;s mid-term<br>and long-term goals for incident management capabilities?<br>A IH&amp;R team models<br>B IH&amp;R mission<br>C IH&amp;R staffing<br>D IH&amp;R vision<br>ANS : D<\/li>\n\n\n\n<li>Which of the following terms defines the purpose and scope of the<br>planned incident handling and response capabilities?<\/li>\n<\/ol>\n\n\n\n<p>4 \/ 25<br>A IH&amp;R mission<br>B IH&amp;R staffing<br>C IH&amp;R team models<br>D IH&amp;R vision ANS :<br>A<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"9\">\n<li>Which of the following backup strategies provides daily status of the<br>backup situation, such as successful, unsuccessful, not run, out of<br>space, etc.?<br>A security<br>B guarantee<br>C data<br>availability D<br>notifications ANS<br>: D<\/li>\n\n\n\n<li>John is an incident response manager at XYZ Inc. As a part of IH&amp;R<br>policy of his organization, he signed a contract between the organization<br>and a third-party insurer to protect organization individuals from different<br>threats and risks.<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>WGU C842 Cyber Defense and Counter Measures EXAM STUDY BUNDLE 2023 &#8211; 2024 (COMPLETE PACKAGE)(Verified) 1 \/ 15C842 Cyber Defense and Counter measures EC Council CertifiedIncident Handler CIH Tools and Commands1.PILAR: Risk analysis and Management tool2.Pilar: Assess risk against critical assets. Qualitative and quantitative.Generate risk assessment reports3.Group Policy Management console: Security policy Tools4.Manageengine \u2026 plus: [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[25],"tags":[],"class_list":["post-119498","post","type-post","status-publish","format-standard","hentry","category-exams-certification"],"_links":{"self":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/119498","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/comments?post=119498"}],"version-history":[{"count":0,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/119498\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/media?parent=119498"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/categories?post=119498"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/tags?post=119498"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}