10.2.17
Which of the following describes a Man-in-the-Middle attack?
An attacker intercepts communications between two network hosts by impersonating each host
You work for a company that offers their services through the Internet. Therefore, it is critical that your website performs well. As a member of the IT technician staff, you receive a call from a fellow employee who informs you that customers are complaining that they can't access your website. After doing a little research, you have determined that you are a victim of a denial-of-service attack. As a first responder, which of the following is the next BEST step to perform?
Contain the problem.
Mark received an email from a software company claiming his account will be disabled soon. The email contains several spelling errors, an attachment, and states he should open the attachment for further instructions. What should Mark do?
Delete the email without opening the attachment.
In which of the following situations should you expect total privacy?
Financial transactions
Which of the following is a common form of social engineering attack
Hoax virus information emails.
Which of the following are the BEST steps you can take to avoid having your mobile device exploited by a hacker or infected by a virus? (Select TWO).
Keep the operating system up to date. Lock the screen with some form of authentication.
in which of the following should you expect some privacy?
Personally identifiable information entered into a human resource database
A technician walks into the office with a UPS. What sort of threat will this device prepare a system for?
Power outage
What is the best countermeasure against social engineering?
User awareness training
A large number of compromised computers are infected with malware that allows an attacker (herder) to control them to spread email spam and launch denial-of-service attacks. Which of the following does this security threat describe?
Zombie/botnet