Network Risk Management (Unit 9) NETWORK+
A spoofed DNS record spreads to other DNS servers. What is this attack called?
DNA poisoning
Which type of DoS attack orchestrates an attack using uninfected computers?
DRDoS (Distributed Reflection DoS) attack
Which of these attacks is a form of Wi-Fi DoS attack?
Deauthentication attack
A former employee discovers six months after he starts work at a new company that his account credentials still give him access to his old company's servers. He demonstrates his access to several friends to brag about his cleverness and talk badly about the company. What kind of attack is this?
Insider threat Ch. 9: Network Risk Management, Section - Security Risks
Leading up to the year 2000, many people expected computer systems the world over to fail when clocks turned the date to January 1, 2000. What type of threat was this?
Logic Bomb Ch:9 Network Risk Management, Section - Security Risks
A company wants to have its employees sign a document that details some project-related information that should not be discussed outside the project's team members. What type of document should they use?
NDA
What kind of attack simulation detects vulnerabilities and attempts to exploit them?
Penetration testing
A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed by hackers to collect information from people who make the same typo. What kind of attack is this?
Phishing
Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct to make recommendations for the upgrade priorities?
Posture assessment
Which of the following is considered a secure protocol?
SSH