To gain unauthorized access to a system without normal authentication procedures
For government access
Pytanie 66
Which of the following firewalls filters ports and system service calls on a single computer operating system?
Network layer firewall
Host-based firewall
Transport layer firewall
Network address translation firewall
Application layer firewall
Pytanie 67
What type of attack disrupts services by overwhelming network devices with bogus traffic?
Zero-day
Brute force
Port scans
DDoS
Pytanie 68
‘Cryptocurrencies are handled on a centralized exchange.’ Is this statement true or false?
False
True
Pytanie 69
Several @Apollo employees have reported that the network access is slow. After investigation, the network administrator has learned that one employee downloaded a third-party scanning program for the printer. What type of malware might have been introduced that is causing slow performance of the network?
Spam
Phishing
Worm
Virus
Pytanie 70
What is an example of cyber kill chain?
a planned process of cyber attack
Pytanie 71
An organization’s process of identifying and assessing risk with the goal of reducing these threats to an acceptable level is known as what?
Risk management
Vulnerability scanning
Disaster recovery
Business continuity
Pytanie 72
An employee is laid off after fifteen years with the same organization. The employee is then hired by another organization within a week. In the new organization, the employee shares documents and ideas for products that the employee proposed at the original organization.
Is the employee’s behavior ethical or unethical?
Wykryliśmy, że blokujesz reklamy na naszej stronie. Aby dokończyć naukę i uzyskać dostęp do podsumowania odblokuj wyświetlanie reklam lub skubskrybuj plan Memorizer+