quiz10

pdf

School

South Texas College *

*We aren’t endorsed by this school

Course

2435

Subject

Information Systems

Date

Dec 6, 2023

Type

pdf

Pages

3

Uploaded by DoctorMetal770

Report
View Assessment 1/3 Quiz 10 Quiz Content Question 1 10 Points Which of the following attack simulations detect vulnerabilities and attempt to exploit them? Choose two. Red team-blue team exercise Vulnerability assessment Security audit Pen testing Question 2 10 Points You need to securely store handheld radios for your network technicians to take with them when they’re troubleshooting problems around your campus network. What’s the best way to store these radios so all your techs can get to them and so you can track who has the radios? Locking rack Smart locker Locking cabinet Access control vestibule Question 3 10 Points A former employee discovers six months after he starts work at a new company that his account credentials still give him access to his old company’s servers. He demonstrates his access to several friends to brag about his cleverness and talk badly about the company. What kind of attack is this? Principle of least privilege Insider threat Vulnerability Denial of service Question 4 10 Points 21 minutes remaining 0 OF 10 QUESTIONS REMAINING
View Assessment 2/3 Leading up to the year 2000, many people expected computer systems the world over to fail when clocks turned the date to January 1, 2000. What type of threat was this? Ransomware Logic bomb Virus Worm Question 5 10 Points A company accidentally sends a newsletter with a mistyped website address. The address points to a website that has been spoofed by hackers to collect information from people who make the same typo. What kind of attack is this? Phishing Tailgating Quid pro quo Baiting Question 6 10 Points A company wants to have its employees sign a document that details some project-related information that should not be discussed outside the project’s team members. What type of document should they use? AUP NDA MDM BYOD Question 7 10 Points Which of the following is considered a secure protocol? FTP SSH Telnet HTTP Question 8 10 Points What type of attack relies on spoofing? Deauth attack
View Assessment 3/3 Friendly DoS attack Tailgating Pen testing Question 9 10 Points Your organization has just approved a special budget for a network security upgrade. What procedure should you conduct to develop your recommendations for the upgrade priorities? Data breach Security audit Exploit Posture assessment Question 10 10 Points Which type of DoS attack orchestrates an attack bounced off uninfected computers? FTP bounce Ransomware DRDoS attack PDoS attack
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help