Exam 9: Network Risk Management

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A variant of BYOD, what does CYOD allow employees or students to do?

(Multiple Choice)
4.9/5
(35)

Over a long-distance connection, using SSH keys is more secure than using passwords.

(True/False)
4.9/5
(33)

How is an acceptable use policy typically used?

(Essay)
4.8/5
(36)

Different types of organizations have similar levels of network security risks.

(True/False)
4.9/5
(26)

It is ideal to use the same password for multiple different applications, provided the password is complex enough.

(True/False)
4.9/5
(37)

Which of the following scenarios represents a phishing attempt?

(Multiple Choice)
4.8/5
(33)

What statement regarding denial-of-service (DoS) attacks is accurate?

(Multiple Choice)
4.7/5
(32)

How often should you require users to change their passwords?

(Multiple Choice)
4.8/5
(35)

How is a posture assessment performed on an organization?

(Multiple Choice)
4.9/5
(37)

Current research indicates that a long, random string of words, such as correct horse battery staple is more secure than a random series of letters, numbers, and symbols that is short enough to be remembered.

(True/False)
4.8/5
(37)

What is vulnerability scanning, and what are the two different types of vulnerability scans?

(Essay)
5.0/5
(34)

A person posing as an employee strikes up a conversation with a legitimate employee as they walk into a secured area, in an attempt to gain access. What kind of social engineering is this?

(Multiple Choice)
4.9/5
(36)

What is hashing, and how does it differ from encryption?

(Essay)
4.9/5
(39)

Which of the following statements correctly describes the malware characteristic of polymorphism?

(Multiple Choice)
4.8/5
(32)

The concept of giving employees and contractors only enough access and privileges to do their jobs is known by what term?

(Multiple Choice)
4.8/5
(29)

A hacker, in the original sense of the word, is someone with technical skill and malicious intent.

(True/False)
4.8/5
(30)

The term malware is derived from a combination of the words malicious and software.

(True/False)
4.9/5
(34)

A virus that remains dormant until a specific condition is met, such as the changing of a file or a match of the current date is known as what type of malware?

(Multiple Choice)
4.9/5
(35)

In the typical social engineering attack cycle, what occurs at Phase 3?

(Multiple Choice)
4.7/5
(32)

In a red team-blue team exercise, what is the purpose of the blue team?

(Multiple Choice)
4.8/5
(34)
Showing 21 - 40 of 50
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)