Strona 6

BSS - ItC (en)

Przejdź na Memorizer+
W trybie testu zyskasz:
Brak reklam
Quiz powtórkowy - pozwoli Ci opanować pytania, których nie umiesz
Więcej pytań na stronie testu
Wybór pytań do ponownego rozwiązania
Trzy razy bardziej pojemną historię aktywności
Wykup dostęp
Pytanie 41
‘Data coming into a program should be sanitized, as it could have malicious content, designed to force the program to behave in an unintended way.’ This statement describes what security vulnerability?
Access control problems
Buffer overflow
Race conditions
Non-validated input
Weaknesses in security practices
Pytanie 42
Which of the following are examples of on-path attacks? (Choose two correct answers)
DDoS
Man-in-the-Mobile
Ransomware
Man-in-the-Middle
Worms
SEO poisoning
Pytanie 43
Which of the following firewalls filters traffic based on application, program or service?
Proxy server
Application layer firewall
Network layer firewall
Host-based firewall
Context aware application firewall
Pytanie 44
A port scan returns a ‘closed’ response. What does this mean?
Connections to the port will be denied
There was no reply from the host
A service is listening on the port
Pytanie 45
'Cryptocurrency transactions are digital.’ Is this statement true or false?
False
True
Pytanie 46
What do you call a digital asset designed to work as a medium of exchange that uses strong encryption to secure a financial transaction?
Google Pay
Cryptocurrency
Apple Pay
Near Field Communications
Pytanie 47
Which of the following tools used for incident detection can be used to detect anomalous behavior, command and control traffic, and detect infected hosts? (Choose two correct answers)
Nmap
NetFlow
Reverse proxy server
Intrusion detection system
Honeypot
Pytanie 48
What name is given to a group of bots, connected through the Internet, with the ability to be controlled by a malicious individual or group?
Hacker network
Botnet
Zombie
Crime syndicate