Nauka

BSS - ItC (en)

Wyświetlane są wszystkie pytania.
Pytanie 33
‘Internet-based cameras and gaming gear are not subject to security breaches.’ Is this statement true or false?
False
True
Pytanie 34
What vulnerability occurs when data is written beyond the memory areas allocated to an application?
Race conditions
Non-validated input
Access control problems
Weaknesses in security practices
Buffer overflow
Pytanie 35
An organization’s IT department reports that their web server is receiving an abnormally high number of web page requests from different locations simultaneously. What type of security attack is occurring?
Social engineering
DDoS
Phishing
Adware
Spyware
Pytanie 36
Which of the following are commonly used port scanning applications? (Select two correct answers)
Port number
Zenmap
Nmap
Sequence number
Pytanie 37
What action will an IDS take upon detection of malicious traffic?
Reroute malicious traffic to a honeypot
Block or deny all traffic
Drop only packets identified as malicious
Create a network alert and log the detection
Pytanie 38
Which of the following statements best describes cybersecurity?
It is the name of a comprehensive security application for end users to protect workstations from being attacked
It is a standard-based model for developing firewall technologies to fight against cybercrime
It is an ongoing effort to protect Internet-connected systems and the data associated with those systems from unauthorized use or harm
It is a framework for security policy development
Pytanie 39
‘After a data breach, it’s important to educate employees, partners and customers on how to prevent future breaches.’ Is this statement true or false?
False
True
Pytanie 40
An employee points out a design flaw in a new product to the department manager. Is this employee’s behavior ethical or unethical?
Ethical
Unethical