Exam 18: Incident Handling
Exam 1: Ethics of Hacking and Cracking18 Questions
Exam 2: Reconnaissance17 Questions
Exam 3: Scanning Tools18 Questions
Exam 4: Sniffers18 Questions
Exam 5: TCP/IP Vulnerabilities18 Questions
Exam 6: Encryption and Password Cracking18 Questions
Exam 7: Spoofing18 Questions
Exam 8: Session Hijacking18 Questions
Exam 9: Hacking Network Devices18 Questions
Exam 10: Trojan Horses18 Questions
Exam 11: Denial-Of-Service Attacks18 Questions
Exam 12: Buffer Overflows18 Questions
Exam 13: Programming Exploits18 Questions
Exam 14: Mail Vulnerabilities18 Questions
Exam 15: Web Application Vulnerabilities18 Questions
Exam 16: Windows Vulnerabilities18 Questions
Exam 17: Unix/Linux Vulnerabilities18 Questions
Exam 18: Incident Handling19 Questions
Select questions type
A(n) ____________________ in a computer-security environment is an event that tests the security solutions in place on a network or, in the case of a stand-alone machine, on that machine itself.
Free
(Short Answer)
4.8/5
(38)
Correct Answer:
incident
Defaced-page incidents result in loss of revenue, reputation, and morale of a company.
Free
(True/False)
4.8/5
(37)
Correct Answer:
True
____________________ tools monitor the events of attacks made on specific computers, such as password cracking or executing unauthorized programs.
Free
(Short Answer)
4.9/5
(30)
Correct Answer:
System-monitoring
Statistics reveal that most incidents of fraud involve "outside" individuals.
(True/False)
4.9/5
(25)
____ tools record unusual activities performed by users, such as repeated attempts to connect to the server or attempts to access restricted resources.
(Multiple Choice)
4.8/5
(43)
The skills represented in an emergency response team always belong to the IT department.
(True/False)
4.8/5
(36)
In UNIX and Linux, ____________________ is a dumping ground for automated CRON jobs, as well as various logged functions by applications that do not maintain their own log files.
(Short Answer)
4.8/5
(37)
What are some of the most common events that may indicate an attack in progress?
(Essay)
4.8/5
(30)
This type of incident means an attacker has hacked your Web server.
(Multiple Choice)
4.9/5
(31)
The most common incidents that affect network security are attacks from malicious code and ____.
(Multiple Choice)
4.7/5
(37)
____ attacks send input data of a greater size than the capacity of an unchecked variable in the server application.
(Multiple Choice)
4.8/5
(38)
What are some of the most common types of incidents that can occur on a network or a computer?
(Essay)
4.7/5
(32)
____ attacks send a large quantity of packets to a server so that resources are overutilized.
(Multiple Choice)
4.9/5
(26)
How one approaches incident detection can seriously impact the number and kinds of incidents that are detectable.
(True/False)
4.8/5
(32)
____________________ is the most basic form of a DoS attack. Large numbers of requests are sent to the server. This results in the slowing down or failure of the network.
(Short Answer)
4.9/5
(30)
The chief difference between a worm and a virus is that ____________________ replicate in a network.
(Short Answer)
4.8/5
(39)
Organizations that handle and document incidents may be less likely to have repeat occurrences.
(True/False)
4.9/5
(39)
What are some of the reasons to develop effective incident handling policies?
(Essay)
4.8/5
(32)
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)