Exam 9: Continued Assessment of Needs, Threats, and Solutions

arrow
  • Select Tags
search iconSearch Question
  • Select Tags

Which of the following is a diagram showing a hierarchy of threats or vulnerabilities?

Free
(Multiple Choice)
4.9/5
(36)
Correct Answer:
Verified

A

__________ in some operating systems are well known by some people,and they are more than capable of testing systems to see if one is open.

Free
(Short Answer)
4.7/5
(35)
Correct Answer:
Verified

Backdoors

What type of threat occurs when a Web page is faked to look exactly like a legitimate company's Web page?

Free
(Multiple Choice)
4.7/5
(38)
Correct Answer:
Verified

D

It is important that the meetings conducted after a test not become a place to judge either processes or people but to __________.

(Multiple Choice)
4.9/5
(37)

A type of attack waged on a network in an attempt to flood the network,thereby preventing legitimate access,is called a(n)__________ attack.

(Short Answer)
4.9/5
(29)
Match the following SWOT terms to their meanings:
Denial of Service
situations that endanger the organization‘s security
Opportunities
ability of an organization to ensure the security and recoverability of their cryptographic keys
Spoofing
tool that is useful in setting up the test for threats
Correct Answer:
Verified
Premises:
Responses:
Denial of Service
situations that endanger the organization‘s security
Opportunities
ability of an organization to ensure the security and recoverability of their cryptographic keys
Spoofing
tool that is useful in setting up the test for threats
Weaknesses
didn’t work as well as it should have
Repudiation
a type of attack waged on a network in an attempt to flood the network, thereby bringing the network to its knees
Tampering
things that were done particularly well
Threat Tree
can be used to make better use of resources
Threats
one person or entity electronically masquerading as another by falsifying data, redirecting URLs, or redirecting messages to an alternative site
Strengths
to interfere or meddle with in order to damage or corrupt
(Matching)
4.8/5
(26)

It may even be to an organization's benefit to schedule at least _________ dedicated to finding all the places where the system can be broken.

(Multiple Choice)
4.8/5
(30)

__________ occurs when the spoofer sets up a redirection of a domain name from its intended IP address destination to an alternative destination in order to gain access to sensitive information.

(Multiple Choice)
4.8/5
(36)

Which of the SWOT terms point out places where an organization might have core competencies or a competitive edge over the competition?

(Multiple Choice)
4.8/5
(38)

The meetings about changes that need to be made should occur as soon as possible __________ the recovery test.

(Short Answer)
4.8/5
(39)

Which of the following is a tool that not only exposes threats to an organization,but points out strengths as well?

(Multiple Choice)
4.8/5
(30)

It is important,before the team has too long of a period of downtime to forget,that they meet at least once to discuss what was done well,what was done poorly,and what was _________

(Short Answer)
4.8/5
(40)

It is often beneficial to the team to praise __________ achievements.

(Multiple Choice)
4.9/5
(25)

What can be learned from a failed recovery test?

(Multiple Choice)
4.9/5
(34)

What usually follows the fact-finding meetings which follow a recovery,whether drill or real?

(Multiple Choice)
4.8/5
(37)

Any attack that gains someone information can result in that information being used to __________ others into revealing even more information to the hacker or to trusting that person with business to which they should not be a party.

(Short Answer)
5.0/5
(30)

Although it is important to not assign blame for things that went badly,it is often beneficial to _________ to give kudos for things that went particularly well.

(Short Answer)
4.8/5
(49)

Typically organizations conduct __________ analyses to determine where they stand with relation to their competitors or to the market as a whole.

(Short Answer)
4.8/5
(37)

Ideally,every threat should be addressed __________ as it is a gap,a place where your organization may find that it is in danger of a future disaster,or at the very least an emergency situation.

(Short Answer)
4.9/5
(41)

Which threat analysis involves the use of backdoors?

(Multiple Choice)
4.9/5
(35)
Showing 1 - 20 of 22
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)