Fiszki

BSS - ItC (en)

Test w formie fiszek
Ilość pytań: 72 Rozwiązywany: 345 razy
‘A botnet can have tens of thousands of bots, or even hundreds of thousands.’ Is this statement true or false?
True
False
True
For what purpose would a network administrator use the Nmap tool?
To collect and analyze security alerts and logs
To protect the private IP addresses of internal hosts
To detect and identify open ports
To identify specific network anomalies
To detect and identify open ports
Which of the following certifications does not expire or require periodic recertification and is geared towards post-secondary graduates and those interested in a career change?
ISC2 Certified Information Systems Security Professional
CompTIA Security+
ISACA CSX Cybersecurity Fundamentals
EC Council Certified Ethical Hacker
Microsoft Technology Associate Security Fundamentals
Palo Alto Networks Certified Cybersecurity Associate
ISACA CSX Cybersecurity Fundamentals
What type of attack uses zombies?
Trojan horse
DDoS
Spear phishing
SEO poisoning
DDoS
What is the purpose of a backdoor?
To enable software vendors to update software
To allow developers to debug software
For government access
To gain unauthorized access to a system without normal authentication procedures
To gain unauthorized access to a system without normal authentication procedures
Which of the following firewalls filters ports and system service calls on a single computer operating system?
Network address translation firewall
Host-based firewall
Network layer firewall
Application layer firewall
Transport layer firewall
Host-based firewall
What type of attack disrupts services by overwhelming network devices with bogus traffic?
Zero-day
DDoS
Brute force
Port scans
DDoS
‘Cryptocurrencies are handled on a centralized exchange.’ Is this statement true or false?
True
False
False
Several @Apollo employees have reported that the network access is slow. After investigation, the network administrator has learned that one employee downloaded a third-party scanning program for the printer. What type of malware might have been introduced that is causing slow performance of the network?
Virus
Phishing
Spam
Worm
Worm
What is an example of cyber kill chain?
a planned process of cyber attack
a planned process of cyber attack
An organization’s process of identifying and assessing risk with the goal of reducing these threats to an acceptable level is known as what?
Disaster recovery
Risk management
Business continuity
Vulnerability scanning
Risk management
An employee is laid off after fifteen years with the same organization. The employee is then hired by another organization within a week. In the new organization, the employee shares documents and ideas for products that the employee proposed at the original organization. Is the employee’s behavior ethical or unethical?
Unethical
Ethical
Unethical

Powiązane tematy

Inne tryby