Network Security - Module 1 (Introduction to Security)

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which threat actors sell their knowledge to other attackers or governments? Criminal syndicates Brokers Competitors Cyberterrorists

Brokers

Which of the following is an attack vector used by threat actors to penetrate a system? Intimidation Phishing Email Urgency

Email

Which of the following is the most common method for delivering malware? Identity theft Removeable media Social media Email

Email

It is NOT possible to hack into a water treatment plant in the United States. T/F

False

A federal appeals court recently made a judgement that caused significant public outrage. Soon after the ruling, the court's website was hacked, and the content was replaced with the text "Equal justice for all." Which of the following type of threat actors attacked the court's site? State actors Insiders Hacktivists Cyberterrorists

Hacktivists

Which of the following computing platforms is highly vulnerable to attacks? On-premises Hybrid Cloud Legacy

Legacy

You work for a enterprise that provides cybersecurity services. You are assigned to examine an enterprise's network and suggest security measures modifications, if necessary. On examining the network, you find that the enterprise hosts most of its computing resources on a cloud platform and few resources on-premises, and both seem to have secure settings implemented. You also find the enterprise computers use the Windows XP operating system. Which of the following vulnerabilities should you insist on fixing first? Configuration vulnerability Zero-day vulnerability Third-party vulnerability Platform vulnerability

Platform Vulnerability

Which of the following is a social engineering method that attempts to influence the subject before the event occurs? Redirection Watering hole Spear phishing Prepending

Prepending

Several websites use URLs similar to one of the most globally popular websites, attempting to attract traffic if a user misspells the popular website's URL. What is this social engineering technique called? Typo squatting Spam Tailgating Pharming

Typo squatting


Conjuntos de estudio relacionados

Comptia Network Plus and Security Plus

View Set

AP CS Chapter 6 short answer solutions

View Set