Exam 1: The Threat Environment
Exam 1: The Threat Environment103 Questions
Exam 2: Planning and Policy124 Questions
Exam 3: Cryptography122 Questions
Exam 4: Secure Networks119 Questions
Exam 5: Access Control124 Questions
Exam 6: Firewalls100 Questions
Exam 7: Host Hardening100 Questions
Exam 8: Application Security100 Questions
Exam 9: Data Protection108 Questions
Exam 10: Incident and Disaster Response107 Questions
Exam 11: Module A: Networking Concepts91 Questions
Select questions type
Watching someone type their password in order to learn the password is called ________.
Free
(Multiple Choice)
4.8/5
(43)
Correct Answer:
B
The primary purpose for attackers to send port scanning probes to hosts is to identify which ports are open.
Free
(True/False)
4.8/5
(31)
Correct Answer:
False
The definition of hacking is "intentionally accessing a computer resource without authorization or in excess of authorization."
(True/False)
4.8/5
(32)
The terms "intellectual property" and "trade secret" are synonymous.
(True/False)
4.9/5
(36)
What type of employee is the most dangerous when it comes to internal IT attacks?
(Multiple Choice)
4.9/5
(39)
Confidentiality means that attackers cannot change or destroy information.
(True/False)
4.9/5
(31)
________ attacks take advantage of flawed human judgment by convincing the victim to take actions that are counter to security policies. (Choose the best answer.)
(Multiple Choice)
4.9/5
(39)
About how long was the Sony PlayStation Network offline as a result of the cyber attacks?
(Multiple Choice)
4.7/5
(35)
When a threat succeeds in causing harm to a business, this is called a ________.
(Multiple Choice)
4.8/5
(33)
In a virus, the code that does damage is called the ________.
(Multiple Choice)
4.9/5
(32)
Money mules transfer stolen money for criminals and take a small percentage for themselves.
(True/False)
4.8/5
(41)
Attackers rarely use IP address spoofing to conceal their identities.
(True/False)
4.7/5
(35)
Preventative countermeasures identify when a threat is attacking and especially when it is succeeding.
(True/False)
4.8/5
(40)
A(n) ________ attack attempts to make a server or network unavailable to serve legitimate users by flooding it with attack packets.
(Multiple Choice)
4.7/5
(35)
Employees often have extensive knowledge of systems and can pose a greater risk than external attackers.
(True/False)
4.8/5
(40)
Showing 1 - 20 of 103
Filters
- Essay(0)
- Multiple Choice(0)
- Short Answer(0)
- True False(0)
- Matching(0)