Which of the following can mitigate the risk of identity theft attacks?
Select one:
a. Two Factor Authentication
b. Firewall
c. Patch Management
d. Intrusion Detection System
Using a managed security service provider to detect and analyze security threats is an example of which risk management approach?
Select one:
a. Risk Analysis
b. Risk Mitigation
c. Risk Acceptance
d. Risk Transfer
Impersonating a user to gain access to systems accessible to that user is an example of
Select one:
a. Identity Theft
b. Social Engineering
c. Email Spoofing
d. Password Stealing
Which of the following security controls do not rely on encryption to protect information?
Select one:
a. Virtual Private Network (VPN)
b. Secure Shell (SSH)
c. Pretty Good Privacy (PGP)
d. Intrusion Detection System (IDS)
Which of the following entities is responsible for investigating and prosecuting criminal acts online?
Select one:
a. National Computer Emergency Response Team
b. Law Enforcement Agency
c. Regional Internet Registry
d. Network Operators
To an organization, systems that can no longer be patched with security fixes can be considered as:
Select one:
a. Vulnerability
b. Loophole
c. Threat
d. Risk
Which of the following is ultimately responsible for formulating the security strategy and making sure that resources are allocated for the organization-wide security program?
Select one:
a. Top Management
b. Penetration Tester
c. Security Auditor
d. Security Analyst
What is the term used to describe the security property that means the information must be accessible to an authorized entity when needed?
Select one:
a. Availability
b. Integrity
c. Accuracy
d. Confidentiality
Which of the following roles normally deal with data recovery and examination after a security breach?
Select one:
a. Security Auditor
b. Digital Forensics Analyst
c. Network Engineers
d. Penetration Tester
Social engineering attacks can be greatly reduced through which of the following countermeasures?
Select one:
a. Intrusion Detection
b. Encryption
c. Firewall
d. Security Awareness Training
No comments:
Post a Comment