Quiz: Module 10 Risk Management

Ace your homework & exams now with Quizwiz!

Which type of DoS attack orchestrates an attack bounced off uninfected computers?

DRDoS (Destributed)

What type of attack relies on spoofing?

Deauth attack

A former employee discovers six months after he starts work at a new company that his account credentials still give him access to his old company's servers. He demonstrates his access to several friends to brag about his cleverness and talk badly about the company. What kind of attack is this?

Insider threat

Leading up to the year 2000, many people expected computer systems the world over to fail when clocks turned the date to January 1, 2000. What type of threat was this?

Logic bomb

A company wants to have its employees sign a document that details some project-related information that should not be discussed outside the project's team members. What type of document should they use?

NDA

Which of the following attack simulations detect vulnerabilities and attempt to exploit them? Choose two.

Pen testing red team blue team exercise

A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed by hackers to collect information from people who make the same typo. What kind of attack is this?

Phising

Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct to develop your recommendations for the upgrade priorities?

Posture assessment

Which of the following is considered a secure protocol?

SSH

You need to securely store handheld radios for your network technicians to take with them when they're troubleshooting problems around your campus network. What's the best way to store these radios so all your techs can get to them and so you can track who has the radios?

Smart locker


Related study sets

ComDes History Final | Chapter 21 : The Conceptual Image

View Set

Chapter 19: Postoperative Nursing Management

View Set