10.2.17

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which of the following describes a Man-in-the-Middle attack?

An attacker intercepts communications between two network hosts by impersonating each host

You work for a company that offers their services through the Internet. Therefore, it is critical that your website performs well. As a member of the IT technician staff, you receive a call from a fellow employee who informs you that customers are complaining that they can't access your website. After doing a little research, you have determined that you are a victim of a denial-of-service attack. As a first responder, which of the following is the next BEST step to perform?

Contain the problem.

Mark received an email from a software company claiming his account will be disabled soon. The email contains several spelling errors, an attachment, and states he should open the attachment for further instructions. What should Mark do?

Delete the email without opening the attachment.

In which of the following situations should you expect total privacy?

Financial transactions

Which of the following is a common form of social engineering attack

Hoax virus information emails.

Which of the following are the BEST steps you can take to avoid having your mobile device exploited by a hacker or infected by a virus? (Select TWO).

Keep the operating system up to date. Lock the screen with some form of authentication.

in which of the following should you expect some privacy?

Personally identifiable information entered into a human resource database

A technician walks into the office with a UPS. What sort of threat will this device prepare a system for?

Power outage

What is the best countermeasure against social engineering?

User awareness training

A large number of compromised computers are infected with malware that allows an attacker (herder) to control them to spread email spam and launch denial-of-service attacks. Which of the following does this security threat describe?

Zombie/botnet


Set pelajaran terkait

para determinar la idea principal de un parrafo; resumir

View Set

Info and Network Security Chapter 11

View Set

Medical Cond in Preg Part I HTN GDM

View Set

Chapter 1.3 - The graph of a function

View Set

Udemy Practice Test 4 Corrections

View Set