Exam 9: Network Risk Management
How is motion detection technology used to monitor and provide security for sensitive areas, and how can it deal with false positives?
Motion detection technology, which triggers an alarm when it detects movement within its field of view, has been around for a long time. Sensors are often found even in home security systems. The latest motion detectors can discern between different types of motion, such as small animals, blowing plants, or walking humans, to reduce false alarms. Motion sensors might be configured to record date and time of motion detection, or trigger lights, alarms, or video cameras.
Hackers are categorized according to their intent and the prior approval of the organizations whose networks they're hacking. What are some of these categories?
Hackers may be categorized as follows:
* white hat hacker-These IT security experts are hired by organizations to assess their security and risks. They're sometimes called ethical hackers. Their goal is to identify security vulnerabilities of all kinds so the organization can make changes to increase their security. The extent of their efforts is usually clearly defined in a written contract before they begin their testing, and their activities are limited by existing laws and restrictions. At no point is private data compromised outside of that trusted relationship.
* black hat hacker-These groups or individuals use their skills to bypass security systems to cause damage, steal data, or compromise privacy. They're not concerned with legal restrictions, and are intent on achieving personal gain or executing a personal agenda against an individual or an organization. Some black hat hackers and groups are also available for hire to serve someone else's agenda.
* gray hat hacker-These hackers abide by a code of ethics all their own. Although they might engage in illegal activity, their intent is to educate and assist. For example, a computer hobbyist who hacks a local business's weak Wi-Fi password, and then reports that weakness to the business owners without damaging or stealing the company's data, has engaged in gray hat hacking. Gray hats are vulnerable to legal prosecution, and therefore often go to a great deal of effort to remain anonymous.
Which type of DoS attack involves an attack that is bounced off uninfected computers before being directed at the target?
C
What type of door access control is a physical or electronic lock that requires a code in order to open the door?
Sudden unexplained increases in file sizes and unusual error messages with no apparent cause are both potential symptoms of a viral infection.
The day after Patch Tuesday is informally dubbed Exploit Wednesday.
An RFID label on a box is an example of what type of physical security detection method?
If someone is offered a free gift or service in exchange for private information or access to a computer system, what type of social engineering is taking place?
Which of the following utilities performs sophisticated vulnerability scans, and can identify unencrypted data such as credit card numbers?
VMware's AirWatch and Cisco's Meraki Systems Manager are both examples of what type of software?
The original version of the Secure Hash Algorithm was developed by MIT.
What document addresses the specific concerns related to special access given to administrators and certain support staff?
If multiple honeypots are connected to form a larger network, what term is used to describe the network?
What type of an attack forces clients off a wireless network, creating a form of Wi-Fi DoS?
When configuring a new device, why should changing the administrative credentials be a top priority?
A drop ceiling could be used by an intruder to gain access to a secured room.
An attack that relies on redirected and captured secure transmissions as they occur is known as what type of attack?
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)