Quiz

¡Supera tus tareas y exámenes ahora con Quizwiz!

'Securing physical access to target equipment is an organization's best defense against a cyber attack.' Is this true or false?

True

how malware might be concealed?

An email is sent to the employees of an organization with an attachment that looks like an antivirus update, but the attachment actually consists of spyware

What is the most common goal of search engine optimization (SEO) poisoning?

To increase web traffic to malicious sites

What is the primary goal of a DoS attack?

To prevent the target server from being able to handle additional requests

Which of the following characteristics describe a worm?

Travels to new computers without any intervention or knowledge of the user and Is self-replicating

What do you call a program written to take advantage of a known security vulnerability?

An exploit

What should be carried out to address known software vulnerabilities of a specific application?

Install a security patch


Conjuntos de estudio relacionados

Ch. 11: Optimal Portfolio Choice and the CAPM

View Set

Exam 3: Chapter 10 Cell Reproduction Study Guide

View Set

Security + Topic 2B: Explain threat intelligence sources; Lesson 2: Explaining threat actors and threat intelligence

View Set

Speed, Agility, and Quickness Training Concepts

View Set

Module Two: Key Actors and Ideas on the World Stage

View Set