Exam 1: Introduction and Security Trends

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

When information is disclosed to individuals not authorized to see it,you have suffered a

(Multiple Choice)
4.8/5
(31)

The steps an attacker takes in attempting to penetrate a targeted network are extremely different from the ones that a security consultant performing a penetration test would take.

(True/False)
4.9/5
(34)

One of the hardest threats that the security professional will have to deal with is the elite hacker. The insider threat is the hardest one to deal with.They already have access to the organization and its assets.

(True/False)
4.7/5
(41)

What is a structured threat?

(Multiple Choice)
4.8/5
(34)

The term "hacktivist" refers to

(Multiple Choice)
4.8/5
(39)

A ping sweep

(Multiple Choice)
4.8/5
(29)

A hacker will run a(n)_______________ in order to determine what services are running on the target machine.

(Short Answer)
4.8/5
(36)

The first step an administrator can take to minimize possible attacks is to ensure that all patches for the operating system and applications are installed.

(True/False)
4.8/5
(37)

The term "script kiddies" refers to

(Multiple Choice)
4.8/5
(31)
Showing 41 - 49 of 49
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)