Pytania i odpowiedzi

BSS - ItC (en)

Zebrane pytania i odpowiedzi do zestawu.
Ilość pytań: 72 Rozwiązywany: 332 razy
Pytanie 61
‘A botnet can have tens of thousands of bots, or even hundreds of thousands.’ Is this statement true or false?
True
Pytanie 62
For what purpose would a network administrator use the Nmap tool?
To detect and identify open ports
Pytanie 63
Which of the following certifications does not expire or require periodic recertification and is geared towards post-secondary graduates and those interested in a career change?
ISACA CSX Cybersecurity Fundamentals
Pytanie 64
What type of attack uses zombies?
DDoS
Pytanie 65
What is the purpose of a backdoor?
To gain unauthorized access to a system without normal authentication procedures
Pytanie 66
Which of the following firewalls filters ports and system service calls on a single computer operating system?
Host-based firewall
Pytanie 67
What type of attack disrupts services by overwhelming network devices with bogus traffic?
DDoS
Pytanie 68
‘Cryptocurrencies are handled on a centralized exchange.’ Is this statement true or false?
False
Pytanie 69
Several @Apollo employees have reported that the network access is slow. After investigation, the network administrator has learned that one employee downloaded a third-party scanning program for the printer. What type of malware might have been introduced that is causing slow performance of the network?
Worm
Pytanie 70
What is an example of cyber kill chain?
a planned process of cyber attack
Pytanie 71
An organization’s process of identifying and assessing risk with the goal of reducing these threats to an acceptable level is known as what?
Risk management
Pytanie 72
An employee is laid off after fifteen years with the same organization. The employee is then hired by another organization within a week. In the new organization, the employee shares documents and ideas for products that the employee proposed at the original organization. Is the employee’s behavior ethical or unethical?
Unethical