Securing Networks
Which term refers to the type of threat actors who are either self-employed or working for large cybercrime organizations?
Cybercriminals
Unencrypted Devices
If the data is not stored using an encryption algorithm, then the thief can retrieve valuable confidential data from stolen corporate laptop.
Email/Social Networking
Intercepted email or IM messages could be captured and reveal confidential information.
Which statement describes the network security term attack surface?
It is the total sum of the vulnerabillies in each system that are accessible to an attacker.
The IT department performs a thorough assessment of security posture for the company data center operation. The risk of potential loss or compromise of critical data is identified. In discussion with the management team, a decision is reached that the critical data should be replicated to a cloud service provider and further insured with an insurance company. Which risk management strategy is employed?
Risk transfer
Improper Access Control
Stolen passwords or weak passwords which have been compromised can provide an attacker easy access to corporate data.
Which term in network security is used to describe a potential danger to an asset such as data or the network itself?
Threat
Removable Media
An employee could perform an unauthorized transfer of data to a USB drive. In addition, a USB drive containing valuable corporate data could be lost.
What is an attack vector?
Itis a path by which a threat actor can gain access to a server host, or network.
Which resource is affected due to weak security settings for a device owned by the company, but housed in another location?
cloud storage device
When considering network security, what is the most valuable asset of an organization?
data