Pytania i odpowiedzi

BSS - ItC (en)

Zebrane pytania i odpowiedzi do zestawu.
Ilość pytań: 72 Rozwiązywany: 327 razy
Pytanie 1
Which of the following firewalls hides or masquerades the private addresses of network hosts?
Network address translation firewall
Pytanie 2
Carrying out a multi-phase, long-term, stealthy and advanced operation against a specific target is often referred to as what?
Advanced persistent threat
Pytanie 3
You are configuring access settings to require employees in your organization to authenticate first before accessing certain web pages. Which requirement of information security is addressed through this configuration?
Confidentiality
Pytanie 4
What are the objectives of ensuring data integrity? (Choose two correct answers)
Data is unaltered during transit
Data is not changed by unauthorized entities
Pytanie 5
An organization is experiencing overwhelming visits to a main web server. You are developing a plan to add a couple of more web servers for load balancing and redundancy. Which requirement of information security is addressed by implementing the plan?
Availability
Pytanie 6
What of the following are examples of cracking an encrypted password? (Choose four correct answers)
Brute force attack
Rainbow tables
Spraying
Dictionary attack
Pytanie 7
Improper management of physical access to a resource, such as a file, can lead to what type of security vulnerability?
Access control problems
Pytanie 8
A medical office employee sends emails to patients about their recent visits to the facility. What information would put the privacy of the patients at risk if it was included in the email?
Patient records
Pytanie 9
What is the best way to avoid getting spyware on a machine?
Install software only from trusted websites
Pytanie 10
You are surfing the Internet using a laptop at a public Wi-Fi cafe. What should you check first before you connect to the public network?
If the laptop requires user authentication for file and media sharing
Pytanie 11
What is the main function of the Cisco Security Incident Response Team?
To ensure company, system and data preservation
Pytanie 12
Which of the following firewalls are placed in front of web services to protect, hide, offload and distribute access to web servers?
Reverse proxy server
Pytanie 13
Which of the following certifications meets the U.S. Department of Defense Directive 8570.01-M requirements, which is important for anyone looking to work in IT security for the federal government?
CompTIA Security+
Pytanie 14
One of your colleagues has lost her identification badge. She is in a hurry to get to a meeting and does not have time to visit Human Resources to get a temporary badge. You lend her your identification badge until she can obtain a replacement. Is this behavior ethical or unethical?
Unethical
Pytanie 15
Which of the following certifications tests your understanding and knowledge in how to look for weaknesses and vulnerabilities in target systems using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner?
EC Council Certified Ethical Hacker
Pytanie 16
What is the main purpose of cyberwarfare?
To gain advantage over adversaries
Pytanie 17
What vulnerability occurs when the output of an event depends on ordered or timed outputs?
Race conditions
Pytanie 18
What do you call the vulnerabilities discovered by Google security researchers that affect almost all CPUs released since 1995? (Select two correct answers)
Spectre
Meltdown
Pytanie 19
If developers attempt to create their own security algorithms, it will likely introduce what type of vulnerabilities?
Weaknesses in security practices
Pytanie 20
Which technology creates a security token that allows a user to log in to a desired web application using credentials from a social media website?
Open authorization