Deck 16: Cybersecurity

ملء الشاشة (f)
exit full mode
سؤال
The terms "hacker" and "attacker" are used to refer to

A) programmers with malicious intentions that pose a risk to a company.
B) analysts with ulterior motives.
C) managers whose behavior poses a risk to the company.
D) executives who treat the company's assets as their own.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
Cybersecurity encompasses

A) actions by programmers with malicious intentions that pose a risk to a company.
B) the measures a company takes to protect a computer or system against unauthorized access or attacks.
C) actions taken by managers which pose a risk to the company.
D) actions by executives who treat the company's assets as their own.
سؤال
Colonial Pipeline, which provides almost 50% of the fuel for the East Coast, is an example of an attack of

A) chaos and destruction.
B) financial data breach.
C) ransomware.
D) reconnaissance.
سؤال
Florida Water Supply, a water treatment facility, is an example of being hacked to

A) obtain financial data.
B) create a denial of service.
C) obtain customer information.
D) cause chaos and destruction.
سؤال
Equifax, a credit reporting agency, was victim to

A) a financial data breach.
B) ransomware.
C) reconnaissance.
D) chaos and destruction.
سؤال
At larger companies, the cybersecurity program is usually the responsibility of a dedicated executive leader. This could include the

A) Chief Executive Officer.
B) Chief Information Officer.
C) Chief Marketing Officer.
D) Chief Operating Officer.
سؤال
At larger companies, the cybersecurity program is usually the responsibility of a dedicated executive leader. This could include the

A) Chief Executive Officer.
B) Chief Marketing Officer.
C) Chief Technology Officer.
D) Chief Operating Officer.
سؤال
At larger companies, the cybersecurity program is usually the responsibility of a dedicated executive leader. This could include the

A) Chief Executive Officer.
B) Chief Marketing Officer.
C) Chief Operating Officer.
D) Chief Information Security Officer.
سؤال
The National Institute of Standards and Technology (NIST) Cybersecurity Framework is displayed below.
<strong>The National Institute of Standards and Technology (NIST) Cybersecurity Framework is displayed below.   What is function A?</strong> A) Recover B) Identify C) Protect D) Detect <div style=padding-top: 35px> What is function A?

A) Recover
B) Identify
C) Protect
D) Detect
سؤال
The National Institute of Standards and Technology (NIST) Cybersecurity Framework is displayed below.
<strong>The National Institute of Standards and Technology (NIST) Cybersecurity Framework is displayed below.   What is function B?</strong> A) Recover B) Identify C) Protect D) Detect <div style=padding-top: 35px> What is function B?

A) Recover
B) Identify
C) Protect
D) Detect
سؤال
The National Institute of Standards and Technology (NIST) Cybersecurity Framework is displayed below.
<strong>The National Institute of Standards and Technology (NIST) Cybersecurity Framework is displayed below.   What is function C?</strong> A) Recover B) Identify C) Protect D) Detect <div style=padding-top: 35px> What is function C?

A) Recover
B) Identify
C) Protect
D) Detect
سؤال
The National Institute of Standards and Technology (NIST) Cybersecurity Framework is displayed below.
<strong>The National Institute of Standards and Technology (NIST) Cybersecurity Framework is displayed below.   What is function D?</strong> A) Recover B) Identify C) Protect D) Detect <div style=padding-top: 35px> What is function D?

A) Recover
B) Identify
C) Protect
D) Detect
سؤال
The National Institute of Standards and Technology (NIST) Cybersecurity Framework is displayed below.
<strong>The National Institute of Standards and Technology (NIST) Cybersecurity Framework is displayed below.   What is function E?</strong> A) Respond B) Identify C) Protect D) Detect <div style=padding-top: 35px> What is function E?

A) Respond
B) Identify
C) Protect
D) Detect
سؤال
The National Institute of Standards and Technology (NIST) has published Security and Privacy Controls for Federal Information Systems and Organizations (NIST-800-53). The NIST-800-53 document is

A) a list of cybersecurity risks companies may face.
B) a catalog of security control baselines for business.
C) a checklist for Information Technology professionals.
D) a list of entry level cybersecurity jobs for Accounting professionals.
سؤال
The National Institute of Standards and Technology (NIST) has published Security and Privacy Controls for Federal Information Systems and Organizations (NIST-800-53). The NIST-800-53 document is divided into

A) 53 chapters.
B) 5 sections.
C) 18 control families.
D) 27 volumes.
سؤال
The National Institute of Standards and Technology (NIST) has published Security and Privacy Controls for Federal Information Systems and Organizations (NIST-800-53). One of the control families is Access Control. What ID does Access Control family use?

A) AT
B) AN
C) AL
D) AC
سؤال
The National Institute of Standards and Technology (NIST) has published Security and Privacy Controls for Federal Information Systems and Organizations (NIST-800-53). One of the control families is Awareness and Training. What ID does Awareness and Training family use?

A) AT
B) AN
C) AL
D) AC
سؤال
The National Institute of Standards and Technology (NIST) has published Security and Privacy Controls for Federal Information Systems and Organizations (NIST-800-53). The NIST-800-53 document is divided into 18 control families. One of the control families is Security Assessment and Authorization. What ID does Security Assessment and Authorization family use?

A) SA
B) CA
C) AA
D) AS
سؤال
The National Institute of Standards and Technology (NIST) has published Security and Privacy Controls for Federal Information Systems and Organizations (NIST-800-53). The NIST-800-53 document is divided into 18 control families. One of the control families is Configuration Management. What ID does Configuration Management family use?

A) CO
B) MC
C) CM
D) CP
سؤال
The National Institute of Standards and Technology (NIST) has published Security and Privacy Controls for Federal Information Systems and Organizations (NIST-800-53). The NIST-800-53 document is divided into 18 control families. One of the control families is Maintenance. What ID does Maintenance family use?

A) MT
B) AM
C) MN
D) MA
سؤال
The National Institute of Standards and Technology (NIST) has published Security and Privacy Controls for Federal Information Systems and Organizations (NIST-800-53). The NIST-800-53 document is divided into 18 control families. One of the control families is Physical and Environmental Protection. What ID does Physical and Environmental Protection family use?

A) PE
B) PP
C) PH
D) PY
سؤال
The National Institute of Standards and Technology (NIST) has published Security and Privacy Controls for Federal Information Systems and Organizations (NIST-800-53). The NIST-800-53 document is divided into 18 control families. One of the control families is Personal Security. What ID does Personal Security family use?

A) PR
B) PS
C) PE
D) SE
سؤال
The National Institute of Standards and Technology (NIST) has published Security and Privacy Controls for Federal Information Systems and Organizations (NIST-800-53). The NIST-800-53 document is divided into 18 control families. One of the control families is System and Information Integrity. What ID does System and Information Integrity family use?

A) SY
B) SS
C) SI
D) SN
سؤال
Which of the following reflects the correct sequence of the three steps of the cyber-kill chain?

A) Gather information about the network, access the network, disrupt the network
B) Access the network, gather information about the network, disrupt the network
C) Access the network, disrupt the network, gather information about the network
D) Disrupt the network, gather information about the network, access the network
سؤال
What step do reconnaissance attacks correspond to in the cyber-kill chain?

A) Steal passwords
B) Gather information about the network
C) Access the network
D) Disrupt the network
سؤال
Cybercriminals look for vulnerabilities in the network, through either a ________, who exposes valuable information or a ________ in the network.

A) person, company
B) company, person
C) person, technical weak point
D) company, technical weak point
سؤال
What two categories do cyberattacks fall into?

A) Conceptual attack, theoretical attack
B) Conceptual attack, logical attack
C) Physical attack, conceptual attack
D) Physical attack, logical attack
سؤال
Attackers us these three types of attacks to plan, enter, and damage a victim's network:
<strong>Attackers us these three types of attacks to plan, enter, and damage a victim's network:   What type of attack is A?</strong> A) Reconnaissance attack B) Access attack C) Disruptive attack D) Translucent attack <div style=padding-top: 35px> What type of attack is A?

A) Reconnaissance attack
B) Access attack
C) Disruptive attack
D) Translucent attack
سؤال
Attackers us these three types of attacks to plan, enter, and damage a victim's network:
<strong>Attackers us these three types of attacks to plan, enter, and damage a victim's network:   What type of attack is B?</strong> A) Reconnaissance attack B) Access attack C) Disruptive attack D) Translucent attack <div style=padding-top: 35px> What type of attack is B?

A) Reconnaissance attack
B) Access attack
C) Disruptive attack
D) Translucent attack
سؤال
Attackers us these three types of attacks to plan, enter, and damage a victim's network:
<strong>Attackers us these three types of attacks to plan, enter, and damage a victim's network:   What type of attack is C?</strong> A) Reconnaissance attack B) Access attack C) Disruptive attack D) Translucent attack <div style=padding-top: 35px> What type of attack is C?

A) Reconnaissance attack
B) Access attack
C) Disruptive attack
D) Translucent attack
سؤال
Which of the physical reconnaissance attacks is a deceptive request designed to trick victims into sharing private information?

A) Email phishing
B) Dumpster diving
C) Eavesdropping
D) Malware
سؤال
Which of the physical reconnaissance attacks is looking through someone else's physical trash?

A) Phishing
B) Dumpster diving
C) Eavesdropping
D) Malware
سؤال
Which of the physical reconnaissance attacks is the unauthorized interception of communication?

A) Phishing
B) Dumpster diving
C) Eavesdropping
D) Malware
سؤال
What is a company's best defense against phishing attacks?

A) Only allow email from certified businesses
B) Shut down email
C) Monitor employee's email
D) Train employees to recognize and report red flags
سؤال
What is an incorrect sender address red flag?

A) Sending from obscure domains that are designed to look similar to legitimate domains
B) Addressing the email to a generic recipient
C) Including grammar or spelling mistakes
D) Using words like "suspended", "security concerns," and "immediately"
سؤال
What is a vague salutation red flag?

A) Sending from obscure domains that are designed to look similar to legitimate domains
B) Addressing the email to a generic recipient
C) Including grammar or spelling mistakes
D) Using words like "suspended", "security concerns," and "immediately"
سؤال
A company's best defense against phishing attacks is to train employees to recognize and report red flags. The correct definition of a poor grammar or spelling red flag is

A) Sending from obscure domains that are designed to look similar to legitimate domains
B) Addressing the email to a generic recipient
C) Including grammar or spelling mistakes
D) Using words like "suspended", "security concerns," and "immediately"
سؤال
What is an urgency red flag?

A) Sending from obscure domains that are designed to look similar to legitimate domains
B) Addressing the email to a generic recipient
C) Including grammar or spelling mistakes
D) Using words like "suspended", "security concerns," and "immediately"
سؤال
What is an unusual links red flag?

A) Hovering over a link in the email shows the actual link is not the same as the displayed text.
B) Addressing the email to a generic recipient
C) Including grammar or spelling mistakes
D) Using words like "suspended", "security concerns," and "immediately"
سؤال
What is a surveys red flag?

A) Sending from obscure domains that are designed to look similar to legitimate domains
B) Asking for personal information in a survey instead of taking you to a company portal to input information directly in the corporate system
C) Including grammar or spelling mistakes
D) Using words like "suspended", "security concerns," and "immediately"
سؤال
What is encryption?

A) Sending from obscure domains that are designed to look similar to legitimate domains
B) A standard network protocol that allows users to transfer files between the company network and outside parties
C) The process of using an algorithm to encode a plaintext message and converting it to something that is seemingly meaningless
D) Asking for personal information in a survey instead of taking you to a company portal to input information directly in the corporate system
سؤال
What is file transfer protocol (FTP)?

A) Sending from obscure domains that are designed to look similar to legitimate domains
B) A standard network protocol that allows users to transfer files between the company network and outside parties
C) The process of using an algorithm to encode a plaintext message and converting it to something that is seemingly meaningless
D) Asking for personal information in a survey instead of taking you to a company portal to input information directly in the corporate system
سؤال
The purpose of a ________, also called an IP probe, is to identify which hosts are active in the network by sending a communication to each IP address to see if there is a response packet.

A) ping sweep
B) port scan
C) computer scan
D) network sweep
سؤال
For hackers to narrow their results, they use ________, which indicates which ports are open and sending or receiving data on the network.

A) ping sweep
B) port scans
C) computer scan
D) network sweep
سؤال
What is it called when a company performs sweeps and scans to detect and classify loopholes in their infrastructure?

A) Vulnerability scans
B) Penetration tests
C) Patches
D) Upgrades
سؤال
What is it called when a company attempts to hack their own systems?

A) Vulnerability scans
B) Penetration tests
C) Patches
D) Upgrades
سؤال
What does a company apply to ensure that systems are running up-to-date security when they are available?

A) Vulnerability scans
B) Penetration tests
C) Patches
D) Upgrades
سؤال
Physical access attacks

A) result in access to either hardware or people.
B) seek unauthorized access to a system by either exploiting a network vulnerability or attempting to use force to get through network security.
C) result in access to customers or vendors.
D) seek unauthorized access to employee records on the network.
سؤال
________ are the biggest weakness in a company's internal control environment.

A) Networks
B) Humans
C) Systems
D) Routers
سؤال
What is accidental tailgating?

A) Unauthorized users are aware that there is a tailgater.
B) The authorized user is aware of the other person and blocks entry to the tailgater.
C) Authorized users are unaware that there is a tailgater.
D) The authorized user is aware of the other person but may politely hold the door for the tailgater.
سؤال
What is polite tailgating?

A) Unauthorized users are aware that there is a tailgater.
B) The authorized user is aware of the other person and blocks entry to the tailgater.
C) Authorized users are unaware that there is a tailgater.
D) The authorized user is aware of the other person but may politely hold the door for the tailgater.
سؤال
Logical access attacks

A) result in access to either hardware or people.
B) seek unauthorized access to a system by either exploiting a network vulnerability or attempting to use force to get through network security.
C) result in access to customers or vendors.
D) seek unauthorized access to employee records on the network.
سؤال
An attacker force access to the network by attempting many passwords or phrases until finding the correct one. What type of attack is being described?

A) Brute-force attack
B) On-path attack
C) IP spoofing
D) Tailgating
سؤال
Which of the following logical access attacks is a brute-force attack?

A) An attacker forces access to the network by attempting many passwords or phrases until finding the correct one.
B) An attacker attempts to gain access to an on-going communication between two endpoints by pretending to be each of the parties.
C) An attacker disguises their identity and impersonates a legitimate computer on the network.
D) An attacker follows an authorized user into the system.
سؤال
What type of logical access attack attempts to gain access to an on-going communication between two endpoints by pretending to be each of the parties?

A) Brute-force attack
B) On-path attack
C) IP spoofing
D) Tailgating
سؤال
Which of the following describes an on-path attack?

A) An on-path attack is when the attacker forces access to the network by attempting many passwords or phrases until finding the correct one.
B) An on-path attack is when the attacker attempts to gain access to an on-going communication between two endpoints by pretending to be each of the parties.
C) An on-path attack is when the attacker disguises their identity and impersonates a legitimate computer on the network.
D) An on-path attack is when the attacker follows an authorized user into the system.
سؤال
What type of logical access attack disguises the source identity and impersonates a legitimate computer on the network?

A) Brute-force attack
B) On-path attack
C) IP spoofing
D) Tailgating
سؤال
Which of the following logical access attacks describes IP spoofing?

A) IP spoofing is when the attacker forces access to the network by attempting many passwords or phrases until finding the correct one.
B) IP spoofing is when the attacker attempts to gain access to an on-going communication between two endpoints by pretending to be each of the parties.
C) IP spoofing is when the attacker disguises their identity and impersonates a legitimate computer on the network.
D) IP spoofing is when the attacker follows an authorized user into the system.
سؤال
NIST provides explicit guidelines that companies can require for password strength. What is the NIST recommended length?

A) 2 - 6 characters
B) 18 - 32 characters
C) 4 - 8 characters
D) 8 - 64 characters
سؤال
NIST provides explicit guidelines that companies can require for password strength. What does NIST recommend for character types?

A) Mixture of letters, numbers, and special characters
B) Numbers only
C) Mixture of numbers and letters
D) Letters only
سؤال
NIST provides explicit guidelines that companies can require for password strength. What is the NIST recommendation for resetting a password?

A) Reset your password every month.
B) Only reset your password if you know it has been compromised.
C) Reset your password every six months.
D) Never reset your password.
سؤال
NIST provides explicit guidelines that companies can require for password strength. What does NIST recommend for password construction?

A) Combine multiple common words in a password.
B) Reuse previous passwords so you remember them.
C) Avoid dictionary words.
D) Use your name as the password.
سؤال
On-path attacks, which were once known as man-in-the-middle attacks, attempt to gain access to an ongoing communication between two endpoints. Which of the following is the definition of eavesdropping?

A) The hacker is actively communicating with the server.
B) The hacker is passively injected into the connection.
C) The hacker is actively injected into the connection.
D) The hacker is only listening to or intercepting the communication.
سؤال
Match the cybersecurity threat to the following control activity:

-Ensure that the information system enforces minimum password complexity of specified case sensitivity, character numbers, and mix of uppercase and lowercase letters, including minimum requirements for each type.

A) Brute-force attack
B) On-path attack
C) IP spoofing
D) Tailgating
سؤال
Match the cybersecurity threat to the following control activity:

-Enforce a specified number of changed characters when new passwords are created.

A) Brute-force attack
B) On-path attack
C) IP spoofing
D) Tailgating
سؤال
Match the cybersecurity threat to the following control activity:

-Prohibit password reuse for a specified number of generations.

A) Brute-force attack
B) On-path attack
C) IP spoofing
D) Tailgating
سؤال
Match the cybersecurity threat to the following control activity:

-Review and update the baseline configuration of the information system using a company-defined frequency.

A) Brute-force attack
B) On-path attack
C) IP spoofing
D) Tailgating
سؤال
Match the cybersecurity threat to the following control activity:

-Review and update the baseline configuration of the information system as an integral part of information system component installations and upgrades.

A) Brute-force attack
B) On-path attack
C) IP spoofing
D) Tailgating
سؤال
Match the cybersecurity threat to the following control activity:

-Ensure that the information system uniquely identifies and authenticates devices before establishing a connection.

A) Brute-force attack
B) On-path attack
C) IP spoofing
D) Tailgating
سؤال
What is an attack that prohibits users from using resources such as computers, websites, servers, or an entire network called?

A) Denial-of-service attack
B) Malware attack
C) Virus attack
D) Logic bomb attack
سؤال
What is a Denial-of-service attack?

A) An attack that prohibits users from using resources such as computers, websites, servers, or an entire network
B) An attack that uses destructive programs to take down a system
C) An attack that is disguised as benign software but carries malicious code that may be activated via a logic bomb
D) An attack that is a piece of malicious code that is programmed into a system and remains dormant until certain conditions are met
سؤال
What is a Botnet attack?

A) An attack that creates a virus that cause a variety of problems
B) An attack that is disguised as benign software but carries malicious code that may be activated via a logic bomb
C) An attack that uses computers infected with malware that function like robots
D) An attack that uses multiple machines or IP addresses to force the target to shut down
سؤال
What is a Distributed Denial-of-Service attack?

A) An attack that creates a virus that cause a variety of problems
B) An attack that is disguised as benign software but carries malicious code that may be activated via a logic bomb
C) An attack that uses computers infected with malware that function like robots
D) An attack that uses multiple machines or IP addresses to force the target to shut down
سؤال
A business can protect itself from DoS and DDoS attacks by ensuring that ________, routers, and intrusion detection systems are up-to-date, are properly configured, and will automatically block the ports where fake requests enter the system.

A) firewalls
B) servers
C) websites
D) ecommerce sites
سؤال
A business can protect itself from DoS and DDoS attacks by ensuring that firewalls, ________, and intrusion detection systems are up-to-date, are properly configured, and will automatically block the ports where fake requests enter the system.

A) servers
B) routers
C) websites
D) ecommerce sites
سؤال
A business can protect itself from DoS and DDoS attacks by ensuring that firewalls, routers, and ________ are up-to-date, are properly configured, and will automatically block the ports where fake requests enter the system.

A) servers
B) websites
C) intrusion detection systems
D) ecommerce sites
سؤال
Which of the following is an example of a Denial-of-Service internal control?

A) Manage capacity, bandwidth, or other redundancy to limit the effects of an attack.
B) Employ malicious code protection mechanisms at information system entry and exit points.
C) Configure malicious code detection to perform periodic scans of the information system, block malicious code, quarantine malicious code, and notify the administrator.
D) Monitor the information systems to detect attacks and indicators of potential attacks, including unauthorized local, network, and remote connections.
سؤال
Which of the following is an example of a Denial-of-Service internal control?

A) Employ malicious code protection mechanisms at information system entry and exit points.
B) Employ monitoring tools to detect indicators of attacks against, or launched from, the system.
C) Configure malicious code detection to perform periodic scans of the information system, block malicious code, quarantine malicious code, and notify the administrator.
D) Monitor the information systems to detect attacks and indicators of potential attacks, including unauthorized local, network, and remote connections.
سؤال
Which of the following is an example of a Denial-of-Service internal control?

A) Employ malicious code protection mechanisms at information system entry and exit points.
B) Configure malicious code detection to perform periodic scans of the information system, block malicious code, quarantine malicious code, and notify the administrator.
C) Monitor system resources to determine if sufficient resources exist to prevent effective attacks.
D) Monitor the information systems to detect attacks and indicators of potential attacks, including unauthorized local, network, and remote connections.
سؤال
What is an attack that uses destructive programs to take down a system called?

A) Denial-of-service attack
B) Malware attack
C) Virus attack
D) Logic bomb attack
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/99
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 16: Cybersecurity
1
The terms "hacker" and "attacker" are used to refer to

A) programmers with malicious intentions that pose a risk to a company.
B) analysts with ulterior motives.
C) managers whose behavior poses a risk to the company.
D) executives who treat the company's assets as their own.
programmers with malicious intentions that pose a risk to a company.
2
Cybersecurity encompasses

A) actions by programmers with malicious intentions that pose a risk to a company.
B) the measures a company takes to protect a computer or system against unauthorized access or attacks.
C) actions taken by managers which pose a risk to the company.
D) actions by executives who treat the company's assets as their own.
the measures a company takes to protect a computer or system against unauthorized access or attacks.
3
Colonial Pipeline, which provides almost 50% of the fuel for the East Coast, is an example of an attack of

A) chaos and destruction.
B) financial data breach.
C) ransomware.
D) reconnaissance.
ransomware.
4
Florida Water Supply, a water treatment facility, is an example of being hacked to

A) obtain financial data.
B) create a denial of service.
C) obtain customer information.
D) cause chaos and destruction.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
5
Equifax, a credit reporting agency, was victim to

A) a financial data breach.
B) ransomware.
C) reconnaissance.
D) chaos and destruction.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
6
At larger companies, the cybersecurity program is usually the responsibility of a dedicated executive leader. This could include the

A) Chief Executive Officer.
B) Chief Information Officer.
C) Chief Marketing Officer.
D) Chief Operating Officer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
7
At larger companies, the cybersecurity program is usually the responsibility of a dedicated executive leader. This could include the

A) Chief Executive Officer.
B) Chief Marketing Officer.
C) Chief Technology Officer.
D) Chief Operating Officer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
8
At larger companies, the cybersecurity program is usually the responsibility of a dedicated executive leader. This could include the

A) Chief Executive Officer.
B) Chief Marketing Officer.
C) Chief Operating Officer.
D) Chief Information Security Officer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
9
The National Institute of Standards and Technology (NIST) Cybersecurity Framework is displayed below.
<strong>The National Institute of Standards and Technology (NIST) Cybersecurity Framework is displayed below.   What is function A?</strong> A) Recover B) Identify C) Protect D) Detect What is function A?

A) Recover
B) Identify
C) Protect
D) Detect
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
10
The National Institute of Standards and Technology (NIST) Cybersecurity Framework is displayed below.
<strong>The National Institute of Standards and Technology (NIST) Cybersecurity Framework is displayed below.   What is function B?</strong> A) Recover B) Identify C) Protect D) Detect What is function B?

A) Recover
B) Identify
C) Protect
D) Detect
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
11
The National Institute of Standards and Technology (NIST) Cybersecurity Framework is displayed below.
<strong>The National Institute of Standards and Technology (NIST) Cybersecurity Framework is displayed below.   What is function C?</strong> A) Recover B) Identify C) Protect D) Detect What is function C?

A) Recover
B) Identify
C) Protect
D) Detect
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
12
The National Institute of Standards and Technology (NIST) Cybersecurity Framework is displayed below.
<strong>The National Institute of Standards and Technology (NIST) Cybersecurity Framework is displayed below.   What is function D?</strong> A) Recover B) Identify C) Protect D) Detect What is function D?

A) Recover
B) Identify
C) Protect
D) Detect
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
13
The National Institute of Standards and Technology (NIST) Cybersecurity Framework is displayed below.
<strong>The National Institute of Standards and Technology (NIST) Cybersecurity Framework is displayed below.   What is function E?</strong> A) Respond B) Identify C) Protect D) Detect What is function E?

A) Respond
B) Identify
C) Protect
D) Detect
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
14
The National Institute of Standards and Technology (NIST) has published Security and Privacy Controls for Federal Information Systems and Organizations (NIST-800-53). The NIST-800-53 document is

A) a list of cybersecurity risks companies may face.
B) a catalog of security control baselines for business.
C) a checklist for Information Technology professionals.
D) a list of entry level cybersecurity jobs for Accounting professionals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
15
The National Institute of Standards and Technology (NIST) has published Security and Privacy Controls for Federal Information Systems and Organizations (NIST-800-53). The NIST-800-53 document is divided into

A) 53 chapters.
B) 5 sections.
C) 18 control families.
D) 27 volumes.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
16
The National Institute of Standards and Technology (NIST) has published Security and Privacy Controls for Federal Information Systems and Organizations (NIST-800-53). One of the control families is Access Control. What ID does Access Control family use?

A) AT
B) AN
C) AL
D) AC
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
17
The National Institute of Standards and Technology (NIST) has published Security and Privacy Controls for Federal Information Systems and Organizations (NIST-800-53). One of the control families is Awareness and Training. What ID does Awareness and Training family use?

A) AT
B) AN
C) AL
D) AC
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
18
The National Institute of Standards and Technology (NIST) has published Security and Privacy Controls for Federal Information Systems and Organizations (NIST-800-53). The NIST-800-53 document is divided into 18 control families. One of the control families is Security Assessment and Authorization. What ID does Security Assessment and Authorization family use?

A) SA
B) CA
C) AA
D) AS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
19
The National Institute of Standards and Technology (NIST) has published Security and Privacy Controls for Federal Information Systems and Organizations (NIST-800-53). The NIST-800-53 document is divided into 18 control families. One of the control families is Configuration Management. What ID does Configuration Management family use?

A) CO
B) MC
C) CM
D) CP
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
20
The National Institute of Standards and Technology (NIST) has published Security and Privacy Controls for Federal Information Systems and Organizations (NIST-800-53). The NIST-800-53 document is divided into 18 control families. One of the control families is Maintenance. What ID does Maintenance family use?

A) MT
B) AM
C) MN
D) MA
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
21
The National Institute of Standards and Technology (NIST) has published Security and Privacy Controls for Federal Information Systems and Organizations (NIST-800-53). The NIST-800-53 document is divided into 18 control families. One of the control families is Physical and Environmental Protection. What ID does Physical and Environmental Protection family use?

A) PE
B) PP
C) PH
D) PY
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
22
The National Institute of Standards and Technology (NIST) has published Security and Privacy Controls for Federal Information Systems and Organizations (NIST-800-53). The NIST-800-53 document is divided into 18 control families. One of the control families is Personal Security. What ID does Personal Security family use?

A) PR
B) PS
C) PE
D) SE
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
23
The National Institute of Standards and Technology (NIST) has published Security and Privacy Controls for Federal Information Systems and Organizations (NIST-800-53). The NIST-800-53 document is divided into 18 control families. One of the control families is System and Information Integrity. What ID does System and Information Integrity family use?

A) SY
B) SS
C) SI
D) SN
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
24
Which of the following reflects the correct sequence of the three steps of the cyber-kill chain?

A) Gather information about the network, access the network, disrupt the network
B) Access the network, gather information about the network, disrupt the network
C) Access the network, disrupt the network, gather information about the network
D) Disrupt the network, gather information about the network, access the network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
25
What step do reconnaissance attacks correspond to in the cyber-kill chain?

A) Steal passwords
B) Gather information about the network
C) Access the network
D) Disrupt the network
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
26
Cybercriminals look for vulnerabilities in the network, through either a ________, who exposes valuable information or a ________ in the network.

A) person, company
B) company, person
C) person, technical weak point
D) company, technical weak point
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
27
What two categories do cyberattacks fall into?

A) Conceptual attack, theoretical attack
B) Conceptual attack, logical attack
C) Physical attack, conceptual attack
D) Physical attack, logical attack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
28
Attackers us these three types of attacks to plan, enter, and damage a victim's network:
<strong>Attackers us these three types of attacks to plan, enter, and damage a victim's network:   What type of attack is A?</strong> A) Reconnaissance attack B) Access attack C) Disruptive attack D) Translucent attack What type of attack is A?

A) Reconnaissance attack
B) Access attack
C) Disruptive attack
D) Translucent attack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
29
Attackers us these three types of attacks to plan, enter, and damage a victim's network:
<strong>Attackers us these three types of attacks to plan, enter, and damage a victim's network:   What type of attack is B?</strong> A) Reconnaissance attack B) Access attack C) Disruptive attack D) Translucent attack What type of attack is B?

A) Reconnaissance attack
B) Access attack
C) Disruptive attack
D) Translucent attack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
30
Attackers us these three types of attacks to plan, enter, and damage a victim's network:
<strong>Attackers us these three types of attacks to plan, enter, and damage a victim's network:   What type of attack is C?</strong> A) Reconnaissance attack B) Access attack C) Disruptive attack D) Translucent attack What type of attack is C?

A) Reconnaissance attack
B) Access attack
C) Disruptive attack
D) Translucent attack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
31
Which of the physical reconnaissance attacks is a deceptive request designed to trick victims into sharing private information?

A) Email phishing
B) Dumpster diving
C) Eavesdropping
D) Malware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
32
Which of the physical reconnaissance attacks is looking through someone else's physical trash?

A) Phishing
B) Dumpster diving
C) Eavesdropping
D) Malware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
33
Which of the physical reconnaissance attacks is the unauthorized interception of communication?

A) Phishing
B) Dumpster diving
C) Eavesdropping
D) Malware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
34
What is a company's best defense against phishing attacks?

A) Only allow email from certified businesses
B) Shut down email
C) Monitor employee's email
D) Train employees to recognize and report red flags
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
35
What is an incorrect sender address red flag?

A) Sending from obscure domains that are designed to look similar to legitimate domains
B) Addressing the email to a generic recipient
C) Including grammar or spelling mistakes
D) Using words like "suspended", "security concerns," and "immediately"
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
36
What is a vague salutation red flag?

A) Sending from obscure domains that are designed to look similar to legitimate domains
B) Addressing the email to a generic recipient
C) Including grammar or spelling mistakes
D) Using words like "suspended", "security concerns," and "immediately"
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
37
A company's best defense against phishing attacks is to train employees to recognize and report red flags. The correct definition of a poor grammar or spelling red flag is

A) Sending from obscure domains that are designed to look similar to legitimate domains
B) Addressing the email to a generic recipient
C) Including grammar or spelling mistakes
D) Using words like "suspended", "security concerns," and "immediately"
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
38
What is an urgency red flag?

A) Sending from obscure domains that are designed to look similar to legitimate domains
B) Addressing the email to a generic recipient
C) Including grammar or spelling mistakes
D) Using words like "suspended", "security concerns," and "immediately"
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
39
What is an unusual links red flag?

A) Hovering over a link in the email shows the actual link is not the same as the displayed text.
B) Addressing the email to a generic recipient
C) Including grammar or spelling mistakes
D) Using words like "suspended", "security concerns," and "immediately"
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
40
What is a surveys red flag?

A) Sending from obscure domains that are designed to look similar to legitimate domains
B) Asking for personal information in a survey instead of taking you to a company portal to input information directly in the corporate system
C) Including grammar or spelling mistakes
D) Using words like "suspended", "security concerns," and "immediately"
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
41
What is encryption?

A) Sending from obscure domains that are designed to look similar to legitimate domains
B) A standard network protocol that allows users to transfer files between the company network and outside parties
C) The process of using an algorithm to encode a plaintext message and converting it to something that is seemingly meaningless
D) Asking for personal information in a survey instead of taking you to a company portal to input information directly in the corporate system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
42
What is file transfer protocol (FTP)?

A) Sending from obscure domains that are designed to look similar to legitimate domains
B) A standard network protocol that allows users to transfer files between the company network and outside parties
C) The process of using an algorithm to encode a plaintext message and converting it to something that is seemingly meaningless
D) Asking for personal information in a survey instead of taking you to a company portal to input information directly in the corporate system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
43
The purpose of a ________, also called an IP probe, is to identify which hosts are active in the network by sending a communication to each IP address to see if there is a response packet.

A) ping sweep
B) port scan
C) computer scan
D) network sweep
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
44
For hackers to narrow their results, they use ________, which indicates which ports are open and sending or receiving data on the network.

A) ping sweep
B) port scans
C) computer scan
D) network sweep
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
45
What is it called when a company performs sweeps and scans to detect and classify loopholes in their infrastructure?

A) Vulnerability scans
B) Penetration tests
C) Patches
D) Upgrades
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
46
What is it called when a company attempts to hack their own systems?

A) Vulnerability scans
B) Penetration tests
C) Patches
D) Upgrades
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
47
What does a company apply to ensure that systems are running up-to-date security when they are available?

A) Vulnerability scans
B) Penetration tests
C) Patches
D) Upgrades
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
48
Physical access attacks

A) result in access to either hardware or people.
B) seek unauthorized access to a system by either exploiting a network vulnerability or attempting to use force to get through network security.
C) result in access to customers or vendors.
D) seek unauthorized access to employee records on the network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
49
________ are the biggest weakness in a company's internal control environment.

A) Networks
B) Humans
C) Systems
D) Routers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
50
What is accidental tailgating?

A) Unauthorized users are aware that there is a tailgater.
B) The authorized user is aware of the other person and blocks entry to the tailgater.
C) Authorized users are unaware that there is a tailgater.
D) The authorized user is aware of the other person but may politely hold the door for the tailgater.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
51
What is polite tailgating?

A) Unauthorized users are aware that there is a tailgater.
B) The authorized user is aware of the other person and blocks entry to the tailgater.
C) Authorized users are unaware that there is a tailgater.
D) The authorized user is aware of the other person but may politely hold the door for the tailgater.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
52
Logical access attacks

A) result in access to either hardware or people.
B) seek unauthorized access to a system by either exploiting a network vulnerability or attempting to use force to get through network security.
C) result in access to customers or vendors.
D) seek unauthorized access to employee records on the network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
53
An attacker force access to the network by attempting many passwords or phrases until finding the correct one. What type of attack is being described?

A) Brute-force attack
B) On-path attack
C) IP spoofing
D) Tailgating
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
54
Which of the following logical access attacks is a brute-force attack?

A) An attacker forces access to the network by attempting many passwords or phrases until finding the correct one.
B) An attacker attempts to gain access to an on-going communication between two endpoints by pretending to be each of the parties.
C) An attacker disguises their identity and impersonates a legitimate computer on the network.
D) An attacker follows an authorized user into the system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
55
What type of logical access attack attempts to gain access to an on-going communication between two endpoints by pretending to be each of the parties?

A) Brute-force attack
B) On-path attack
C) IP spoofing
D) Tailgating
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
56
Which of the following describes an on-path attack?

A) An on-path attack is when the attacker forces access to the network by attempting many passwords or phrases until finding the correct one.
B) An on-path attack is when the attacker attempts to gain access to an on-going communication between two endpoints by pretending to be each of the parties.
C) An on-path attack is when the attacker disguises their identity and impersonates a legitimate computer on the network.
D) An on-path attack is when the attacker follows an authorized user into the system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
57
What type of logical access attack disguises the source identity and impersonates a legitimate computer on the network?

A) Brute-force attack
B) On-path attack
C) IP spoofing
D) Tailgating
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
58
Which of the following logical access attacks describes IP spoofing?

A) IP spoofing is when the attacker forces access to the network by attempting many passwords or phrases until finding the correct one.
B) IP spoofing is when the attacker attempts to gain access to an on-going communication between two endpoints by pretending to be each of the parties.
C) IP spoofing is when the attacker disguises their identity and impersonates a legitimate computer on the network.
D) IP spoofing is when the attacker follows an authorized user into the system.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
59
NIST provides explicit guidelines that companies can require for password strength. What is the NIST recommended length?

A) 2 - 6 characters
B) 18 - 32 characters
C) 4 - 8 characters
D) 8 - 64 characters
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
60
NIST provides explicit guidelines that companies can require for password strength. What does NIST recommend for character types?

A) Mixture of letters, numbers, and special characters
B) Numbers only
C) Mixture of numbers and letters
D) Letters only
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
61
NIST provides explicit guidelines that companies can require for password strength. What is the NIST recommendation for resetting a password?

A) Reset your password every month.
B) Only reset your password if you know it has been compromised.
C) Reset your password every six months.
D) Never reset your password.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
62
NIST provides explicit guidelines that companies can require for password strength. What does NIST recommend for password construction?

A) Combine multiple common words in a password.
B) Reuse previous passwords so you remember them.
C) Avoid dictionary words.
D) Use your name as the password.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
63
On-path attacks, which were once known as man-in-the-middle attacks, attempt to gain access to an ongoing communication between two endpoints. Which of the following is the definition of eavesdropping?

A) The hacker is actively communicating with the server.
B) The hacker is passively injected into the connection.
C) The hacker is actively injected into the connection.
D) The hacker is only listening to or intercepting the communication.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
64
Match the cybersecurity threat to the following control activity:

-Ensure that the information system enforces minimum password complexity of specified case sensitivity, character numbers, and mix of uppercase and lowercase letters, including minimum requirements for each type.

A) Brute-force attack
B) On-path attack
C) IP spoofing
D) Tailgating
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
65
Match the cybersecurity threat to the following control activity:

-Enforce a specified number of changed characters when new passwords are created.

A) Brute-force attack
B) On-path attack
C) IP spoofing
D) Tailgating
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
66
Match the cybersecurity threat to the following control activity:

-Prohibit password reuse for a specified number of generations.

A) Brute-force attack
B) On-path attack
C) IP spoofing
D) Tailgating
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
67
Match the cybersecurity threat to the following control activity:

-Review and update the baseline configuration of the information system using a company-defined frequency.

A) Brute-force attack
B) On-path attack
C) IP spoofing
D) Tailgating
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
68
Match the cybersecurity threat to the following control activity:

-Review and update the baseline configuration of the information system as an integral part of information system component installations and upgrades.

A) Brute-force attack
B) On-path attack
C) IP spoofing
D) Tailgating
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
69
Match the cybersecurity threat to the following control activity:

-Ensure that the information system uniquely identifies and authenticates devices before establishing a connection.

A) Brute-force attack
B) On-path attack
C) IP spoofing
D) Tailgating
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
70
What is an attack that prohibits users from using resources such as computers, websites, servers, or an entire network called?

A) Denial-of-service attack
B) Malware attack
C) Virus attack
D) Logic bomb attack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
71
What is a Denial-of-service attack?

A) An attack that prohibits users from using resources such as computers, websites, servers, or an entire network
B) An attack that uses destructive programs to take down a system
C) An attack that is disguised as benign software but carries malicious code that may be activated via a logic bomb
D) An attack that is a piece of malicious code that is programmed into a system and remains dormant until certain conditions are met
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
72
What is a Botnet attack?

A) An attack that creates a virus that cause a variety of problems
B) An attack that is disguised as benign software but carries malicious code that may be activated via a logic bomb
C) An attack that uses computers infected with malware that function like robots
D) An attack that uses multiple machines or IP addresses to force the target to shut down
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
73
What is a Distributed Denial-of-Service attack?

A) An attack that creates a virus that cause a variety of problems
B) An attack that is disguised as benign software but carries malicious code that may be activated via a logic bomb
C) An attack that uses computers infected with malware that function like robots
D) An attack that uses multiple machines or IP addresses to force the target to shut down
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
74
A business can protect itself from DoS and DDoS attacks by ensuring that ________, routers, and intrusion detection systems are up-to-date, are properly configured, and will automatically block the ports where fake requests enter the system.

A) firewalls
B) servers
C) websites
D) ecommerce sites
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
75
A business can protect itself from DoS and DDoS attacks by ensuring that firewalls, ________, and intrusion detection systems are up-to-date, are properly configured, and will automatically block the ports where fake requests enter the system.

A) servers
B) routers
C) websites
D) ecommerce sites
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
76
A business can protect itself from DoS and DDoS attacks by ensuring that firewalls, routers, and ________ are up-to-date, are properly configured, and will automatically block the ports where fake requests enter the system.

A) servers
B) websites
C) intrusion detection systems
D) ecommerce sites
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
77
Which of the following is an example of a Denial-of-Service internal control?

A) Manage capacity, bandwidth, or other redundancy to limit the effects of an attack.
B) Employ malicious code protection mechanisms at information system entry and exit points.
C) Configure malicious code detection to perform periodic scans of the information system, block malicious code, quarantine malicious code, and notify the administrator.
D) Monitor the information systems to detect attacks and indicators of potential attacks, including unauthorized local, network, and remote connections.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
78
Which of the following is an example of a Denial-of-Service internal control?

A) Employ malicious code protection mechanisms at information system entry and exit points.
B) Employ monitoring tools to detect indicators of attacks against, or launched from, the system.
C) Configure malicious code detection to perform periodic scans of the information system, block malicious code, quarantine malicious code, and notify the administrator.
D) Monitor the information systems to detect attacks and indicators of potential attacks, including unauthorized local, network, and remote connections.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
79
Which of the following is an example of a Denial-of-Service internal control?

A) Employ malicious code protection mechanisms at information system entry and exit points.
B) Configure malicious code detection to perform periodic scans of the information system, block malicious code, quarantine malicious code, and notify the administrator.
C) Monitor system resources to determine if sufficient resources exist to prevent effective attacks.
D) Monitor the information systems to detect attacks and indicators of potential attacks, including unauthorized local, network, and remote connections.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
80
What is an attack that uses destructive programs to take down a system called?

A) Denial-of-service attack
B) Malware attack
C) Virus attack
D) Logic bomb attack
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 99 في هذه المجموعة.