14.5.7 PQ NET126

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which type of DoS attack exhausts the target's resources by overloading a specific program or service?

Application layer

Which of the following are risks of implementing a BYOD policy? (Select three.)

Data leakage Number of different devices Improper disposal

At company headquarters, several employees are having issues with their Wi-Fi access suddenly dropping and then reconnecting to the same wireless network. You decide to investigate and determine that someone has set up a rogue access point near company headquarters and is using it to capture sensitive data from the company network. Which type of social engineering attack is being used?

Evil twin

You have been hired to help assess the security of your client's organization. During your assessment, you have found a rogue wireless access point that is configured to look identical to the legitimate wireless network. Which of the following attacks was MOST likely being carried out?

Evil twin attack

A malicious person calls an employee from a cell phone. She tells the employee that she is the vice president over the accounting department in the employee's company. She relates that she has forgotten her password and demands that the employee give her his password so that she can access the reports she needs for an upcoming presentation. She threatens to fire the employee if he does not comply. Which of the following BEST describes the type of attack that just occurred?

Impersonation

Which of the following should you implement to monitor and manage the risks of a BYOD policy?

Mobile device management

Which of the following is a form of attack that tricks victims into providing confidential information, such as identity information or logon credentials, through emails or websites that impersonate an online entity that the victim trusts, such as a financial institution or well-known e-commerce site?

Phishing

You have been hired to investigate a recent cybersecurity attack. You have discovered that the attacker was able to send commands to the server using the login fields and steal user credentials from the database. Which of the following attacks was your client MOST likely the victim of?

SQL injection

What do you call a system that has no anti-malware or firewall installed?

Unprotected

Which of the following attacks exploits a vulnerability in software that has not been discovered by the developer?

Zero-day attack


Ensembles d'études connexes

Chapter 9/10: Narrative Theory & Solution Based Theory

View Set

Management & Organizational Behavior Exam 1

View Set

Employment Law Chapter 3: Title VII of the Civil Rights Act of 1964

View Set

Chapter 10: Assessing the Ears (Exam 2)

View Set

Abeka 5th Grade History Chapter 13 Check Up section E

View Set

Karch's PrepU CH. 54 Drugs Acting on the Upper Respiratory Tract

View Set

Chapter 6 Multiple Choice and True False Quiz

View Set

Exam 1/Week 1 - Interview Process

View Set

NUR 2211 Medical Surgical Nursing Chapter 15: Nursing Management: Patients With Complications From Heart Disease

View Set