Exam 16: Cybersecurity

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

What is a Distributed Denial-of-Service attack?

(Multiple Choice)
4.9/5
(32)

Attackers us these three types of attacks to plan, enter, and damage a victim's network: Attackers us these three types of attacks to plan, enter, and damage a victim's network:   What type of attack is C? What type of attack is C?

(Multiple Choice)
4.7/5
(26)

The National Institute of Standards and Technology (NIST) has published Security and Privacy Controls for Federal Information Systems and Organizations (NIST-800-53). The NIST-800-53 document is divided into 18 control families. One of the control families is Physical and Environmental Protection. What ID does Physical and Environmental Protection family use?

(Multiple Choice)
4.8/5
(41)

________ are the biggest weakness in a company's internal control environment.

(Multiple Choice)
4.8/5
(41)

Attackers us these three types of attacks to plan, enter, and damage a victim's network: Attackers us these three types of attacks to plan, enter, and damage a victim's network:   What type of attack is A? What type of attack is A?

(Multiple Choice)
4.8/5
(34)

At larger companies, the cybersecurity program is usually the responsibility of a dedicated executive leader. This could include the

(Multiple Choice)
4.8/5
(36)

What is code used by hackers that is disguised as benign software but carries malicious code that may be activated via a logic bomb?

(Multiple Choice)
4.9/5
(37)

Logical access attacks

(Multiple Choice)
4.8/5
(42)

Colonial Pipeline, which provides almost 50% of the fuel for the East Coast, is an example of an attack of

(Multiple Choice)
4.7/5
(31)

Which of the following logical access attacks describes IP spoofing?

(Multiple Choice)
4.8/5
(36)

Match the cybersecurity threat to the following control activity: -Review and update the baseline configuration of the information system as an integral part of information system component installations and upgrades.

(Multiple Choice)
4.7/5
(37)

What is a type of malware used by hackers that replicates without the assistance of human interaction?

(Multiple Choice)
4.9/5
(41)

Cybercriminals look for vulnerabilities in the network, through either a ________, who exposes valuable information or a ________ in the network.

(Multiple Choice)
4.9/5
(36)

What is encryption?

(Multiple Choice)
4.8/5
(45)

What type of logical access attack disguises the source identity and impersonates a legitimate computer on the network?

(Multiple Choice)
4.8/5
(39)

RAM Manufacturing LLC is a rapidly growing manufacturer of parts for the automotive industry. Maeve is an IT auditor at RAM Manufacturing, working on a project for the Cybersecurity department. Maeve has prioritized the following cyberattack categories: • Denial-of-service attacks • Viruses • Worms • Logic bombs • Trojan horses Match the following attack description to one of these cyberattack categories. -On Saturday, June 2nd, at exactly 12:00 noon, a program stopped allowing users to log in.

(Multiple Choice)
4.8/5
(36)

The National Institute of Standards and Technology (NIST) Cybersecurity Framework is displayed below. The National Institute of Standards and Technology (NIST) Cybersecurity Framework is displayed below.   What is function A? What is function A?

(Multiple Choice)
4.7/5
(36)

Equifax, a credit reporting agency, was victim to

(Multiple Choice)
4.7/5
(31)

On-path attacks, which were once known as man-in-the-middle attacks, attempt to gain access to an ongoing communication between two endpoints. Which of the following is the definition of eavesdropping?

(Multiple Choice)
4.8/5
(42)

What is a vague salutation red flag?

(Multiple Choice)
4.9/5
(36)
Showing 41 - 60 of 99
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)