Strona 9

BSS - ItC (en)

Pytanie 65
What is the purpose of a backdoor?
For government access
To enable software vendors to update software
To allow developers to debug software
To gain unauthorized access to a system without normal authentication procedures
Pytanie 66
Which of the following firewalls filters ports and system service calls on a single computer operating system?
Host-based firewall
Network address translation firewall
Application layer firewall
Network layer firewall
Transport layer firewall
Pytanie 67
What type of attack disrupts services by overwhelming network devices with bogus traffic?
Brute force
Port scans
DDoS
Zero-day
Pytanie 68
‘Cryptocurrencies are handled on a centralized exchange.’ Is this statement true or false?
False
True
Pytanie 69
Several @Apollo employees have reported that the network access is slow. After investigation, the network administrator has learned that one employee downloaded a third-party scanning program for the printer. What type of malware might have been introduced that is causing slow performance of the network?
Virus
Spam
Worm
Phishing
Pytanie 70
What is an example of cyber kill chain?
a planned process of cyber attack
Pytanie 71
An organization’s process of identifying and assessing risk with the goal of reducing these threats to an acceptable level is known as what?
Vulnerability scanning
Risk management
Business continuity
Disaster recovery
Pytanie 72
An employee is laid off after fifteen years with the same organization. The employee is then hired by another organization within a week. In the new organization, the employee shares documents and ideas for products that the employee proposed at the original organization. Is the employee’s behavior ethical or unethical?
Ethical
Unethical
Przejdź na Memorizer+
W trybie testu zyskasz:
Brak reklam
Quiz powtórkowy - pozwoli Ci opanować pytania, których nie umiesz
Więcej pytań na stronie testu
Wybór pytań do ponownego rozwiązania
Trzy razy bardziej pojemną historię aktywności
Wykup dostęp