Pytania i odpowiedzi

BSS - ItC (en)

Zebrane pytania i odpowiedzi do zestawu.
Ilość pytań: 72 Rozwiązywany: 328 razy
Pytanie 41
‘Data coming into a program should be sanitized, as it could have malicious content, designed to force the program to behave in an unintended way.’ This statement describes what security vulnerability?
Non-validated input
Pytanie 42
Which of the following are examples of on-path attacks? (Choose two correct answers)
Man-in-the-Mobile
Man-in-the-Middle
Pytanie 43
Which of the following firewalls filters traffic based on application, program or service?
Application layer firewall
Pytanie 44
A port scan returns a ‘closed’ response. What does this mean?
Connections to the port will be denied
Pytanie 45
'Cryptocurrency transactions are digital.’ Is this statement true or false?
True
Pytanie 46
What do you call a digital asset designed to work as a medium of exchange that uses strong encryption to secure a financial transaction?
Cryptocurrency
Pytanie 47
Which of the following tools used for incident detection can be used to detect anomalous behavior, command and control traffic, and detect infected hosts? (Choose two correct answers)
Intrusion detection system
NetFlow
Pytanie 48
What name is given to a group of bots, connected through the Internet, with the ability to be controlled by a malicious individual or group?
Botnet
Pytanie 49
What is the best approach for preventing a compromised IoT device from maliciously accessing data and devices on a local network?
Place all IoT devices that have access to the Internet on an isolated network
Pytanie 50
What name is given to the emerging threat that hides on a computer or mobile device and uses that machine’s resources to mine cryptocurrencies?
Cryptojacking
Pytanie 51
A port scan returns an ‘open’ response. What does this mean?
A service is listening on the port
Pytanie 52
An employee is at a restaurant with friends and tells them about an exciting new video game that is under development at the organization they work for. Is this employee’s behavior ethical or unethical?
Unethical
Pytanie 53
‘An advanced persistent threat (APT) is usually well funded.’ Is this statement true or false?
True
Pytanie 54
In networking, what name is given to the identifier at both ends of a transmission to ensure that the right data is passed to the correct application?
Port number
Pytanie 55
‘An employee does something as an organization representative with the knowledge of that organization and this action is deemed illegal. The organization is legally responsible for this action.’ Is this statement true or false?
True
Pytanie 56
What tool is used to lure an attacker so that an administrator can capture, log and analyze the behavior of the attack?
Honeypot
Pytanie 57
‘A data breach does not impact the reputation of an organization.’ Is this statement true or false?
False
Pytanie 58
Which of the following certifications is aimed at high school and early college students, as well as anyone interested in a career change?
Microsoft Technology Associate Security Fundamentals
Pytanie 59
Which of the following firewalls filters traffic based on source and destination data ports and filtering based on connection states?
Transport layer firewall
Pytanie 60
Which of the following are categories of security measures or controls? (Choose three correct answers)
Policy and procedure
Technology
Awareness, training and education