Securing Networks

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which term refers to the type of threat actors who are either self-employed or working for large cybercrime organizations?

Cybercriminals

Unencrypted Devices

If the data is not stored using an encryption algorithm, then the thief can retrieve valuable confidential data from stolen corporate laptop.

Email/Social Networking

Intercepted email or IM messages could be captured and reveal confidential information.

Which statement describes the network security term attack surface?

It is the total sum of the vulnerabillies in each system that are accessible to an attacker.

The IT department performs a thorough assessment of security posture for the company data center operation. The risk of potential loss or compromise of critical data is identified. In discussion with the management team, a decision is reached that the critical data should be replicated to a cloud service provider and further insured with an insurance company. Which risk management strategy is employed?

Risk transfer

Improper Access Control

Stolen passwords or weak passwords which have been compromised can provide an attacker easy access to corporate data.

Which term in network security is used to describe a potential danger to an asset such as data or the network itself?

Threat

Removable Media

An employee could perform an unauthorized transfer of data to a USB drive. In addition, a USB drive containing valuable corporate data could be lost.

What is an attack vector?

Itis a path by which a threat actor can gain access to a server host, or network.

Which resource is affected due to weak security settings for a device owned by the company, but housed in another location?

cloud storage device

When considering network security, what is the most valuable asset of an organization?

data


Kaugnay na mga set ng pag-aaral

Chapter 36: Impact of Chronic Illness, Disability, or End of Life Care

View Set

PHRASAL VERBS complete fce for schools

View Set

Spanish III/Realidades 2/1B Partial Review

View Set

Lab 13-2: Using Microsoft Command Line Tools

View Set

Noughts & Crosses - Remember what happened!

View Set