Upon infection, what a malware does is dependent on the
Select one:
a. Payload
b. Trojan
c. Worm
d. Exploit Kit
Which of the following entities provide internet access by routing packets and announcing routes to other networks?
Select one:
a. Network Operators
b. Domain Name Registry
c. Regional Internet Registry
d. Domain Name Systems
Which of the following controls can be used to protect data that is traversing the network?
Select one:
a. Virtual Private Network (VPN)
b. Firewall
c. Intrusion Detection System
d. Anti Virus Software
Limiting access to information on the need to know basis is an example of:
Select one:
a. Principle of the Least Privilege
b. Principle of Access Control
c. The principle of the weakest link
d. Denial of Service
Tricking users to give away their login credentials is an example of
Select one:
a. Malware
b. Password Sniffing
c. Denial of Service
d. Phishing
Which of the following can affect the integrity of data and information?
Select one:
a. Phishing
b. Unauthorized Modification
c. Denial of Service
d. Unauthorized Shutdown
Deploying a firewall is an example of which security control category?
Select one:
a. Policy
b. Technical
c. Virtual
d. Physical
Which of the following role is responsible for making sure that the web application is not subjected to attacks as SQL injection or Cross-Site Scripting?
Select one:
a. Security Analyst
b. Software Developer
c. Network Engineer
d. Security Auditor
Which of the following is an implementation of the principle of least privilege?
Select one:
a. Applying security patches to the operating system
b. Enforcing TLS/SSL on the web server
c. Performing regular security scanning on internal systems
d. Limiting what a user is able to read or execute on a system
Which of the following is not affected by a web defacement incident?
Select one:
a. Information Integrity
b. Information Availability
c. Organization's reputation
d. Server uptime
No comments:
Post a Comment