chapter10Quiz
rtf
keyboard_arrow_up
School
Ivy Tech Community College, Northcentral *
*We aren’t endorsed by this school
Course
105
Subject
Information Systems
Date
Dec 6, 2023
Type
rtf
Pages
2
Uploaded by DukeHeat12453
Your organization has just approved a special budget for a network security upgrade. What
procedure should you conduct to develop your recommendations for the upgrade priorities?
a. Exploit
xxxb. Posture assessment
c. Data breach
zzd. Security audit
Which type of DoS attack orchestrates an attack bounced off uninfected computers?
xxxa. DRDoS attack
b. Ransomware
c. PDoS attack
d. FTP bounce
A company accidentally sends a newsletter with a mistyped website address. The address points
to a website that has been spoofed by hackers to collect information from people who make the
same typo. What kind of attack is this?
a. Quid pro quo
xxxxb. Phishing
c. Baiting
d. Tailgating
A former employee discovers six months after he starts work at a new company that his account
credentials still give him access to his old company's servers. He demonstrates his access to
several friends to brag about his cleverness and talk badly about the company. What kind of
attack is this?
xxxxa. Insider threat
b. Principle of least privilege
c. Denial of service
d. Vulnerability
What type of attack relies on spoofing?
a. Tailgating
b. Pen testing
xxxc. Deauth attack
d. Friendly DoS attack
You need to securely store handheld radios for your network technicians to take with them when
they're troubleshooting problems around your campus network. What's the best way to store
these radios so all your techs can get to them and so you can track who has the radios?
xxxa. Smart locker
b. Access control vestibule
c. Locking rack
d. Locking cabinet
Which of the following attack simulations detect vulnerabilities and attempt to exploit them?
Choose two.
a. Vulnerability assessment
b. Security audit
xxc. Red team–blue team exercise
xxd. Pen testing
Which of the following is considered a secure protocol?
xxxa. SSH
b. HTTP
c. Telnet
d. FTP
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help