Nauka

BSS - ItC (en)

Wyświetlane są wszystkie pytania.
Pytanie 41
‘Data coming into a program should be sanitized, as it could have malicious content, designed to force the program to behave in an unintended way.’ This statement describes what security vulnerability?
Non-validated input
Buffer overflow
Access control problems
Race conditions
Weaknesses in security practices
Pytanie 42
Which of the following are examples of on-path attacks? (Choose two correct answers)
Man-in-the-Mobile
Man-in-the-Middle
Worms
Ransomware
SEO poisoning
DDoS
Pytanie 43
Which of the following firewalls filters traffic based on application, program or service?
Network layer firewall
Context aware application firewall
Proxy server
Application layer firewall
Host-based firewall
Pytanie 44
A port scan returns a ‘closed’ response. What does this mean?
A service is listening on the port
Connections to the port will be denied
There was no reply from the host
Pytanie 45
'Cryptocurrency transactions are digital.’ Is this statement true or false?
False
True
Pytanie 46
What do you call a digital asset designed to work as a medium of exchange that uses strong encryption to secure a financial transaction?
Near Field Communications
Cryptocurrency
Apple Pay
Google Pay
Pytanie 47
Which of the following tools used for incident detection can be used to detect anomalous behavior, command and control traffic, and detect infected hosts? (Choose two correct answers)
NetFlow
Reverse proxy server
Intrusion detection system
Honeypot
Nmap
Pytanie 48
What name is given to a group of bots, connected through the Internet, with the ability to be controlled by a malicious individual or group?
Botnet
Crime syndicate
Zombie
Hacker network
Przejdź na Memorizer+
W trybie nauki zyskasz:
Brak reklam
Quiz powtórkowy - pozwoli Ci opanować pytania, których nie umiesz
Więcej pytań na stronie testu
Wybór pytań do ponownego rozwiązania
Trzy razy bardziej pojemną historię aktywności
Wykup dostęp