Deck 9: Continued Assessment of Needs, Threats, and Solutions
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/22
Play
Full screen (f)
Deck 9: Continued Assessment of Needs, Threats, and Solutions
1
__________ occurs when the spoofer sets up a redirection of a domain name from its intended IP address destination to an alternative destination in order to gain access to sensitive information.
A)Spoofing
B)Pharming
C)Tampering
D)Repudiation.
A)Spoofing
B)Pharming
C)Tampering
D)Repudiation.
B
2
It is important that the meetings conducted after a test not become a place to judge either processes or people but to __________.
A)determine success or failure
B)develop a test plan
C)determine what needs to be backed up
D)find facts
A)determine success or failure
B)develop a test plan
C)determine what needs to be backed up
D)find facts
D
3
Typically organizations conduct __________ analyses to determine where they stand with relation to their competitors or to the market as a whole.
SWOT
4
A type of attack waged on a network in an attempt to flood the network,thereby preventing legitimate access,is called a(n)__________ attack.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
5
What type of threat occurs when a Web page is faked to look exactly like a legitimate company's Web page?
A)Repudiation
B)Denial of Service
C)Tampering
D)Spoofing
A)Repudiation
B)Denial of Service
C)Tampering
D)Spoofing
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
6
Any attack that gains someone information can result in that information being used to __________ others into revealing even more information to the hacker or to trusting that person with business to which they should not be a party.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
7
Although it is important to not assign blame for things that went badly,it is often beneficial to _________ to give kudos for things that went particularly well.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
8
Which of the following is a tool that not only exposes threats to an organization,but points out strengths as well?
A)Denial of Service
B)SWOT analysis
C)Threat tree
D)Repudiation
A)Denial of Service
B)SWOT analysis
C)Threat tree
D)Repudiation
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
9
What is the next vital step after a recovery test?
A)Decide where to place blame on the things that went wrong.
B)Meet as a team and discuss lessons learned.
C)Determine the order in which backups need to be restored.
D)All of the above.
A)Decide where to place blame on the things that went wrong.
B)Meet as a team and discuss lessons learned.
C)Determine the order in which backups need to be restored.
D)All of the above.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
10
It may even be to an organization's benefit to schedule at least _________ dedicated to finding all the places where the system can be broken.
A)one recovery meeting that is
B)two recovery meetings that are
C)one test cycle that is
D)two test cycles that are
A)one recovery meeting that is
B)two recovery meetings that are
C)one test cycle that is
D)two test cycles that are
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
11
The meetings about changes that need to be made should occur as soon as possible __________ the recovery test.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
12
Which threat analysis involves the use of backdoors?
A)Discoverable
B)Users/Systems Affected
C)Exploitable
D)Reproducible.
A)Discoverable
B)Users/Systems Affected
C)Exploitable
D)Reproducible.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
13
Ideally,every threat should be addressed __________ as it is a gap,a place where your organization may find that it is in danger of a future disaster,or at the very least an emergency situation.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
14
It is often beneficial to the team to praise __________ achievements.
A)even minor
B)only major
C)only non-team members'
D)only team members'
A)even minor
B)only major
C)only non-team members'
D)only team members'
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the SWOT terms point out places where an organization might have core competencies or a competitive edge over the competition?
A)Strengths
B)Weaknesses
C)Opportunities
D)Threats
A)Strengths
B)Weaknesses
C)Opportunities
D)Threats
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
16
What can be learned from a failed recovery test?
A)the time necessary for a full recovery
B)the list of possible disasters
C)the existence of forgotten applications that were not backed up
D)all of the above
A)the time necessary for a full recovery
B)the list of possible disasters
C)the existence of forgotten applications that were not backed up
D)all of the above
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
17
What usually follows the fact-finding meetings which follow a recovery,whether drill or real?
A)changes to the recovery plan
B)a completely new recovery plan
C)blame for failure is assigned as needed
D)a walk-through test
A)changes to the recovery plan
B)a completely new recovery plan
C)blame for failure is assigned as needed
D)a walk-through test
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following is a diagram showing a hierarchy of threats or vulnerabilities?
A)Threat tree
B)Spoofing
C)Denial of Service
D)Repudiation
A)Threat tree
B)Spoofing
C)Denial of Service
D)Repudiation
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
19
It is important,before the team has too long of a period of downtime to forget,that they meet at least once to discuss what was done well,what was done poorly,and what was _________
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
20
Once you discover a threat at the recovery site which of the following is important to analyze?
A)Exploitable
B)Reproducible
C)Users/Systems Affected
D)Discoverable
A)Exploitable
B)Reproducible
C)Users/Systems Affected
D)Discoverable
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
21
__________ in some operating systems are well known by some people,and they are more than capable of testing systems to see if one is open.
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck
22
Match between columns
Unlock Deck
Unlock for access to all 22 flashcards in this deck.
Unlock Deck
k this deck