Nauka

BSS - ItC (en)

Wyświetlane są wszystkie pytania.
Pytanie 49
What is the best approach for preventing a compromised IoT device from maliciously accessing data and devices on a local network?
Disconnect all IoT devices from the Internet
Install a software firewall on every network device
Set the security settings of workstation web browsers to a higher level
Place all IoT devices that have access to the Internet on an isolated network
Pytanie 50
What name is given to the emerging threat that hides on a computer or mobile device and uses that machine’s resources to mine cryptocurrencies?
Cryptoransomware
Bluejacking
Cryptojacking
Phishing
Pytanie 51
A port scan returns an ‘open’ response. What does this mean?
Connections to the port will be denied
A service is listening on the port
There was no reply from the host
Pytanie 52
An employee is at a restaurant with friends and tells them about an exciting new video game that is under development at the organization they work for. Is this employee’s behavior ethical or unethical?
Ethical
Unethical
Pytanie 53
‘An advanced persistent threat (APT) is usually well funded.’ Is this statement true or false?
False
True
Pytanie 54
In networking, what name is given to the identifier at both ends of a transmission to ensure that the right data is passed to the correct application?
MAC address
IP address
Sequence number
Port number
Pytanie 55
‘An employee does something as an organization representative with the knowledge of that organization and this action is deemed illegal. The organization is legally responsible for this action.’ Is this statement true or false?
False
True
Pytanie 56
What tool is used to lure an attacker so that an administrator can capture, log and analyze the behavior of the attack?
IDS
Nmap
Honeypot
NetFlow