Nauka

BSS - ItC (en)

Wyświetlane są wszystkie pytania.
Przejdź na Memorizer+
W trybie nauki zyskasz:
Brak reklam
Quiz powtórkowy - pozwoli Ci opanować pytania, których nie umiesz
Więcej pytań na stronie testu
Wybór pytań do ponownego rozwiązania
Trzy razy bardziej pojemną historię aktywności
Wykup dostęp
Pytanie 1
Which of the following firewalls hides or masquerades the private addresses of network hosts?
Host-based firewall
Network address translation firewall
Reverse proxy firewall
Network layer firewall
Proxy server
Pytanie 2
Carrying out a multi-phase, long-term, stealthy and advanced operation against a specific target is often referred to as what?
Advanced persistent threat
Script kiddies
Rainbow tables
Network sniffing
Social engineering
Pytanie 3
You are configuring access settings to require employees in your organization to authenticate first before accessing certain web pages. Which requirement of information security is addressed through this configuration?
Availability
Confidentiality
Scalability
Integrity
Pytanie 4
What are the objectives of ensuring data integrity? (Choose two correct answers)
Data is encrypted while in transit and when stored on disks
Data is not changed by unauthorized entities
Access to the data is authenticated
Data is available all the time
Data is unaltered during transit
Pytanie 5
An organization is experiencing overwhelming visits to a main web server. You are developing a plan to add a couple of more web servers for load balancing and redundancy. Which requirement of information security is addressed by implementing the plan?
Scalability
Confidentiality
Availability
Integrity
Pytanie 6
What of the following are examples of cracking an encrypted password? (Choose four correct answers)
Social engineering
Intimidation
Spraying
Dictionary attack
Brute force attack
Rainbow tables
Network sniffing
Pytanie 7
Improper management of physical access to a resource, such as a file, can lead to what type of security vulnerability?
Buffer overflow
Access control problems
Weaknesses in security practices
Non-validated input
Race conditions
Pytanie 8
A medical office employee sends emails to patients about their recent visits to the facility. What information would put the privacy of the patients at risk if it was included in the email?
Patient records
Contact information
Next appointment
First and last name