Strona 5

BSS - ItC (en)

Pytanie 33
‘Internet-based cameras and gaming gear are not subject to security breaches.’ Is this statement true or false?
False
True
Pytanie 34
What vulnerability occurs when data is written beyond the memory areas allocated to an application?
Access control problems
Buffer overflow
Non-validated input
Race conditions
Weaknesses in security practices
Pytanie 35
An organization’s IT department reports that their web server is receiving an abnormally high number of web page requests from different locations simultaneously. What type of security attack is occurring?
DDoS
Social engineering
Spyware
Phishing
Adware
Pytanie 36
Which of the following are commonly used port scanning applications? (Select two correct answers)
Sequence number
Nmap
Port number
Zenmap
Pytanie 37
What action will an IDS take upon detection of malicious traffic?
Create a network alert and log the detection
Drop only packets identified as malicious
Block or deny all traffic
Reroute malicious traffic to a honeypot
Pytanie 38
Which of the following statements best describes cybersecurity?
It is the name of a comprehensive security application for end users to protect workstations from being attacked
It is a framework for security policy development
It is an ongoing effort to protect Internet-connected systems and the data associated with those systems from unauthorized use or harm
It is a standard-based model for developing firewall technologies to fight against cybercrime
Pytanie 39
‘After a data breach, it’s important to educate employees, partners and customers on how to prevent future breaches.’ Is this statement true or false?
True
False
Pytanie 40
An employee points out a design flaw in a new product to the department manager. Is this employee’s behavior ethical or unethical?
Unethical
Ethical
Przejdź na Memorizer+
W trybie testu zyskasz:
Brak reklam
Quiz powtórkowy - pozwoli Ci opanować pytania, których nie umiesz
Więcej pytań na stronie testu
Wybór pytań do ponownego rozwiązania
Trzy razy bardziej pojemną historię aktywności
Wykup dostęp