Filters
Question type

Study Flashcards

What is vulnerability scanning, and what are the two different types of vulnerability scans?

Correct Answer

verifed

verified

* authenticated-In this case, the attack...

View Answer

In the typical social engineering attack cycle, what occurs at Phase 3?


A) The attacker researches the desired target for clues as to vulnerabilities.
B) The attacker builds trust with the target and attempts to gain more information.
C) The attacker exploits an action undertaken by the victim in order to gain access.
D) The attacker executes an exit strategy in such a way that does not leave evidence or raise suspicion.

E) A) and C)
F) A) and B)

Correct Answer

verifed

verified

What is hashing, and how does it differ from encryption?

Correct Answer

verifed

verified

Hashing means to transform data through ...

View Answer

A hacker, in the original sense of the word, is someone with technical skill and malicious intent.

A) True
B) False

Correct Answer

verifed

verified

A virus that remains dormant until a specific condition is met, such as the changing of a file or a match of the current date is known as what type of malware?


A) encrypted virus
B) logic bomb
C) boot sector virus
D) worm

E) B) and C)
F) A) and D)

Correct Answer

verifed

verified

How is a posture assessment performed on an organization?


A) A thorough examination of each aspect of the organization's network is performed to determine how it might be compromised.
B) A third party organization is tasked with attempting to break into the organization and compromise security in order to determine threat vectors.
C) A report of data that is subject to special regulation is created, such that the organization is aware of what data needs protection.
D) An assessment of how a network will perform under stress is performed to determine if the network throughput is adequate.

E) None of the above
F) All of the above

Correct Answer

verifed

verified

In a red team-blue team exercise, what is the purpose of the blue team?


A) The blue team is tasked with attacking the network.
B) The blue team must observe the actions of the red team.
C) The blue team is charged with the defense of the network.
D) The blue team consists of regulators that ensure no illegal activity is undertaken.

E) All of the above
F) A) and D)

Correct Answer

verifed

verified

A variant of BYOD, what does CYOD allow employees or students to do?


A) They can supply their own software on a computer or mobile device.
B) They can supply their choice of cloud application or storage.
C) They can choose a device from a limited number of options.
D) They can use whatever devices they wish to bring.

E) A) and B)
F) C) and D)

Correct Answer

verifed

verified

It is ideal to use the same password for multiple different applications, provided the password is complex enough.

A) True
B) False

Correct Answer

verifed

verified

Over a long-distance connection, using SSH keys is more secure than using passwords.

A) True
B) False

Correct Answer

verifed

verified

The concept of giving employees and contractors only enough access and privileges to do their jobs is known by what term?


A) least-risk privilege profile
B) principle of least privilege
C) minimal access/minimal exposure
D) limited liability access

E) C) and D)
F) None of the above

Correct Answer

verifed

verified

How is an acceptable use policy typically used?

Correct Answer

verifed

verified

An AUP (acceptable use policy) explains ...

View Answer

Which of the following statements correctly describes the malware characteristic of polymorphism?


A) Polymorphic malware can change its characteristics every time it is transferred to a new system.
B) Polymorphic malware is designed to activate on a particular date, remaining harmless until that time.
C) Polymorphic malware is software that disguises itself as a legitimate program, or replaces a legitimate program's code with destructive code.
D) Polymorphic malware utilizes encryption to prevent detection.

E) A) and D)
F) B) and D)

Correct Answer

verifed

verified

The term malware is derived from a combination of the words malicious and software.

A) True
B) False

Correct Answer

verifed

verified

What statement regarding denial-of-service (DoS) attacks is accurate?


A) A denial-of-service attack occurs when a MAC address is impersonated on the network.
B) A denial-of-service attack prevents legitimate users from accessing normal network resources.
C) A denial-of-service attack is generally a result of a disgruntled employee.
D) A denial-of-service attack is no longer a major concern due to the increased throughput available on most networks.

E) B) and C)
F) C) and D)

Correct Answer

verifed

verified

How often should you require users to change their passwords?


A) every 30 days
B) every 60 days
C) every 90 days
D) every 120 days

E) C) and D)
F) B) and D)

Correct Answer

verifed

verified

Which of the following scenarios represents a phishing attempt?


A) An employee at your company has received a malware-infected file in their e-mail.
B) A person posing as an employee tried to access a secured area at your organization.
C) A gift was offered to an employee with access to secured information in exchange for details.
D) An e-mail was sent to a manager at your company that appeared to be from the company's CTO, asking for access.

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Different types of organizations have similar levels of network security risks.

A) True
B) False

Correct Answer

verifed

verified

A person posing as an employee strikes up a conversation with a legitimate employee as they walk into a secured area, in an attempt to gain access. What kind of social engineering is this?


A) phishing
B) baiting
C) quid pro quo
D) tailgating

E) A) and B)
F) A) and C)

Correct Answer

verifed

verified

Current research indicates that a long, random string of words, such as correct horse battery staple is more secure than a random series of letters, numbers, and symbols that is short enough to be remembered.

A) True
B) False

Correct Answer

verifed

verified

Showing 21 - 40 of 50

Related Exams

Show Answer