Intro to Cyber Test
Which technology creates a security token that allows a user to log in to a desired web app using credentials from a social media web site
Open authorization
What is the best approach to prevent compromised IoT device from maliciously accessing data and devices on a local network
Put them on their own network
A company experiencing overwhelming visits to a main web server. The IT department is developing is developing a plan to add a couple more web servers for load balancing and redundancy. Which requirement of info security is addressed by implementing the plan
Availability
What is the best method to avoid getting spyware on a machine
Get software only from trusted web sites
A web server administrator is configuring access settings to require users to authenticate first before accessing certain web pages. Which requirement of info security is addressed through configuration
Confidentially
The IT department is reporting that a company web server is recieving an abnormally high number of web page requests from different locations simultaneously. Which type of security attack is occuring?
DDOS
What type of attack uses zombies
DDOS
What are two objectives in ensuring data integrity
Data is unaltered during transit and not changed by authorized users
What is the main purpose of cyber warfare
To take an advantage of tour enemies
An employee does something as a company rep with rhe knowledge of that company and this action is deemed illegal. The company would be legally responsible for this action
True
When describing malware, what is a difference between a virus and a worm?
Viruses must be attached to a file while worms replicate itself
What are two security implementations that use biometrics
Finger print and voice recognition