Correct Answer
verified
View Answer
Multiple Choice
A) The attacker researches the desired target for clues as to vulnerabilities.
B) The attacker builds trust with the target and attempts to gain more information.
C) The attacker exploits an action undertaken by the victim in order to gain access.
D) The attacker executes an exit strategy in such a way that does not leave evidence or raise suspicion.
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
True/False
Correct Answer
verified
Multiple Choice
A) encrypted virus
B) logic bomb
C) boot sector virus
D) worm
Correct Answer
verified
Multiple Choice
A) A thorough examination of each aspect of the organization's network is performed to determine how it might be compromised.
B) A third party organization is tasked with attempting to break into the organization and compromise security in order to determine threat vectors.
C) A report of data that is subject to special regulation is created, such that the organization is aware of what data needs protection.
D) An assessment of how a network will perform under stress is performed to determine if the network throughput is adequate.
Correct Answer
verified
Multiple Choice
A) The blue team is tasked with attacking the network.
B) The blue team must observe the actions of the red team.
C) The blue team is charged with the defense of the network.
D) The blue team consists of regulators that ensure no illegal activity is undertaken.
Correct Answer
verified
Multiple Choice
A) They can supply their own software on a computer or mobile device.
B) They can supply their choice of cloud application or storage.
C) They can choose a device from a limited number of options.
D) They can use whatever devices they wish to bring.
Correct Answer
verified
True/False
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) least-risk privilege profile
B) principle of least privilege
C) minimal access/minimal exposure
D) limited liability access
Correct Answer
verified
Essay
Correct Answer
verified
View Answer
Multiple Choice
A) Polymorphic malware can change its characteristics every time it is transferred to a new system.
B) Polymorphic malware is designed to activate on a particular date, remaining harmless until that time.
C) Polymorphic malware is software that disguises itself as a legitimate program, or replaces a legitimate program's code with destructive code.
D) Polymorphic malware utilizes encryption to prevent detection.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) A denial-of-service attack occurs when a MAC address is impersonated on the network.
B) A denial-of-service attack prevents legitimate users from accessing normal network resources.
C) A denial-of-service attack is generally a result of a disgruntled employee.
D) A denial-of-service attack is no longer a major concern due to the increased throughput available on most networks.
Correct Answer
verified
Multiple Choice
A) every 30 days
B) every 60 days
C) every 90 days
D) every 120 days
Correct Answer
verified
Multiple Choice
A) An employee at your company has received a malware-infected file in their e-mail.
B) A person posing as an employee tried to access a secured area at your organization.
C) A gift was offered to an employee with access to secured information in exchange for details.
D) An e-mail was sent to a manager at your company that appeared to be from the company's CTO, asking for access.
Correct Answer
verified
True/False
Correct Answer
verified
Multiple Choice
A) phishing
B) baiting
C) quid pro quo
D) tailgating
Correct Answer
verified
True/False
Correct Answer
verified
Showing 21 - 40 of 50
Related Exams