Exam 4: Vulnerability Assessment and Mitigating Attacks
Exam 1: Introduction to Security42 Questions
Exam 2: Malware and Social Engineering Attacks42 Questions
Exam 3: Application and Network Attacks42 Questions
Exam 4: Vulnerability Assessment and Mitigating Attacks42 Questions
Exam 5: Host, Application, and Data Security42 Questions
Exam 6: Network Security42 Questions
Exam 7: Administering a Secure Network42 Questions
Exam 8: Wireless Network Security42 Questions
Exam 9: Access Control Fundamentals42 Questions
Exam 10: Authentication and Account Management42 Questions
Exam 11: Basic Cryptography42 Questions
Exam 12: Advanced Cryptography42 Questions
Exam 13: Business Continuity42 Questions
Exam 14: Risk Mitigation42 Questions
Select questions type
When performing a vulnerability assessment, many organizations use ____ software to search a system for any port vulnerabilities.
Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
C
A ____ outlines the major security considerations for a system and becomes the starting point for solid security.
Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
D
____ is the proportion of an asset's value that is likely to be destroyed by a particular risk.
Free
(Multiple Choice)
4.9/5
(40)
Correct Answer:
C
When a security hardware device fails or a program aborts, which state should it go into?
(Essay)
4.9/5
(41)
The ____ is the expected monetary loss every time a risk occurs.
(Multiple Choice)
4.8/5
(40)
Most vulnerability scanners maintain a(n) ____________________ that categorizes and describes the vulnerabilities that it can detect.
(Short Answer)
4.9/5
(38)
In an empty box test, the tester has no prior knowledge of the network infrastructure that is being tested.
(True/False)
4.9/5
(32)
____ is the probability that a risk will occur in a particular year.
(Multiple Choice)
4.8/5
(35)
When using a black box test, many testers use ____________________ tricks to learn about the network infrastructure from inside employees.
(Short Answer)
4.9/5
(39)
____ is a comparison of the present state of a system compared to its baseline.
(Multiple Choice)
4.8/5
(32)
Vulnerability scans are usually performed from outside the security perimeter.
(True/False)
4.7/5
(35)
The goal of ____ is to better understand who the attackers are, why they attack, and what types of attacks might occur.
(Multiple Choice)
4.8/5
(39)
A healthy security posture results from a sound and workable strategy toward managing risks.
(True/False)
4.8/5
(29)
A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic, yet they are actually imitations of real data files.
(Multiple Choice)
4.8/5
(36)
A ____ in effect takes a snapshot of the current security of the organization.
(Multiple Choice)
4.8/5
(39)
Showing 1 - 20 of 42
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)