Exam 1: The Threat Environment
Exam 1: The Threat Environment69 Questions
Exam 2: Planning and Policy105 Questions
Exam 3: Cryptography101 Questions
Exam 4: Secure Networks81 Questions
Exam 5: Access Control63 Questions
Exam 6: Firewalls68 Questions
Exam 7: Host Hardening78 Questions
Exam 8: Application Security67 Questions
Exam 9: Data Protection69 Questions
Exam 10: Incident and Disaster Response67 Questions
Exam 11: Module a Networking Concepts79 Questions
Select questions type
The chances of an organization having a data breach over the next two years is approximately ________.
Free
(Multiple Choice)
4.7/5
(37)
Correct Answer:
D
________ are considered the most dangerous of all employees.
Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
B
Which of the following countries was NOT cited by the Foreign Economic Espionage in Cyberspace as being the most capable cyber actors actively engaged in economic espionage?
Free
(Multiple Choice)
4.7/5
(35)
Correct Answer:
D
Cookies are small text strings stored on your own personal computer.
(True/False)
4.9/5
(33)
Identify theft can (and does) happen to individuals, but it is not a worry or risk that corporations have.
(True/False)
4.9/5
(30)
More than 67 percent of data breaches come from hackers trying to make money.
(True/False)
4.7/5
(35)
A distributed denial-of-service attach is the most common type of DoS attack.
(True/False)
4.8/5
(39)
Sending packets with false IP source addresses is known as ________.
(Multiple Choice)
4.9/5
(46)
Which of the following is likely the most common criminal attack on individuals?
(Multiple Choice)
4.8/5
(30)
Black-market website programs reward researchers for finding vulnerabilities within their computer systems.
(True/False)
4.8/5
(44)
Which of the following companies experienced the largest data breach in history in 2016?
(Multiple Choice)
4.8/5
(23)
________ is a sophisticated computer hack usually perpetrated by a large, well-funded organization.
(Multiple Choice)
4.8/5
(36)
Penalties for hacking are significantly different if you are attempting to steal a million dollars or attempting to steal nothing of value.
(True/False)
4.8/5
(29)
In click fraud, a criminal website owner creates a program so cookies are automatically downloaded to the computer's hard drive.
(True/False)
4.9/5
(34)
Showing 1 - 20 of 69
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)