Quiz: Module 10 Risk Management

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which type of DoS attack orchestrates an attack bounced off uninfected computers?

DRDoS attack

What type of attack relies on spoofing?

Deauth attack

A former employee discovers six months after he starts work at a new company that his account credentials still give him access to his old company's servers. He demonstrates his access to several friends to brag about his cleverness and talk badly about the company. What kind of attack is this?

Insider threat

Leading up to the year 2000, many people expected computer systems the world over to fail when clocks turned the date to January 1, 2000. What type of threat was this?

Logic bomb

A company wants to have its employees sign a document that details some project-related information that should not be discussed outside the project's team members. What type of document should they use?

NDA

A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed by hackers to collect information from people who make the same typo. What kind of attack is this?

Phishing

Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct to develop your recommendations for the upgrade priorities?

Posture assessment

Which of the following attack simulations detect vulnerabilities and attempt to exploit them? Choose two.

Red team-blue team exercise Pen testing

Which of the following is considered a secure protocol?

SSH

You need to securely store handheld radios for your network technicians to take with them when they're troubleshooting problems around your campus network. What's the best way to store these radios so all your techs can get to them and so you can track who has the radios?

Smart locker


Set pelajaran terkait

Chapter 1 Multiple Choice Questions

View Set

Howard Gardner; Multiple Intelligences Theory

View Set

nur265 exam 3 shock/burn chpt 26,37

View Set

PRACTICE QUESTIONS Molecular Biology Final

View Set

SY0-401:3 TS Quiz Threats and Vulnerabilities

View Set

Chapter 8: Teams and Team Players in a Service Desk Setting

View Set