Testout 10.2
Zombie/Botnet
A large number of compromised computers are infected with malware that allows an attacker (herder) to control them to spread email spam and launch denial-of-service attacks. Which of the following does this security threat describe?
Power Outage
A technician walks into the office with a UPS. What sort of threat will this device prepare a system for?
Personally Identifiable Information entered into a human resource database.
In which of the following should you expect some privacy?
Financial Transactions
In which of the following situations should you expect total privacy?
Delete the Email without opening the attachment
Mark received an email from a software company claiming his account will be disabled soon. The email contains several spelling errors, an attachment, and states he should open the attachment for further instructions. What should Mark do?
User-Awareness Training
What is the best countermeasure against social engineering?
Lock the screen with some sort of authentication Keep the operating system up to date
Which of the following are the BEST steps you can take to avoid having your mobile device exploited by a hacker or infected by a virus? (Select TWO).
An attacker intercepts communications between two network hosts by impersonating each host
Which of the following describes a Man-in-the-Middle attack?
Hoax Virus Emails
Which of the following is a common form of social engineering attack?
Contain the problem
You work for a company that offers their services through the Internet. Therefore, it is critical that your website performs well. As a member of the IT technician staff, you receive a call from a fellow employee who informs you that customers are complaining that they can't access your website. After doing a little research, you have determined that you are a victim of a denial-of-service attack. As a first responder, which of the following is the next BEST step to perform?