Intro to Cyber Test

Ace your homework & exams now with Quizwiz!

Which technology creates a security token that allows a user to log in to a desired web app using credentials from a social media web site

Open authorization

What is the best approach to prevent compromised IoT device from maliciously accessing data and devices on a local network

Put them on their own network

A company experiencing overwhelming visits to a main web server. The IT department is developing is developing a plan to add a couple more web servers for load balancing and redundancy. Which requirement of info security is addressed by implementing the plan

Availability

What is the best method to avoid getting spyware on a machine

Get software only from trusted web sites

A web server administrator is configuring access settings to require users to authenticate first before accessing certain web pages. Which requirement of info security is addressed through configuration

Confidentially

The IT department is reporting that a company web server is recieving an abnormally high number of web page requests from different locations simultaneously. Which type of security attack is occuring?

DDOS

What type of attack uses zombies

DDOS

What are two objectives in ensuring data integrity

Data is unaltered during transit and not changed by authorized users

What is the main purpose of cyber warfare

To take an advantage of tour enemies

An employee does something as a company rep with rhe knowledge of that company and this action is deemed illegal. The company would be legally responsible for this action

True

When describing malware, what is a difference between a virus and a worm?

Viruses must be attached to a file while worms replicate itself

What are two security implementations that use biometrics

Finger print and voice recognition


Related study sets

Professional Counseling Orientation and Ethical Practice

View Set

Chapter 39: Fluid, Electrolyte, and Acid-Base Balance

View Set