Deck 9: Continued Assessment of Needs, Threats, and Solutions
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
Match between columns
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/22
العب
ملء الشاشة (f)
Deck 9: Continued Assessment of Needs, Threats, and Solutions
1
__________ occurs when the spoofer sets up a redirection of a domain name from its intended IP address destination to an alternative destination in order to gain access to sensitive information.
A)Spoofing
B)Pharming
C)Tampering
D)Repudiation.
A)Spoofing
B)Pharming
C)Tampering
D)Repudiation.
B
2
It is important that the meetings conducted after a test not become a place to judge either processes or people but to __________.
A)determine success or failure
B)develop a test plan
C)determine what needs to be backed up
D)find facts
A)determine success or failure
B)develop a test plan
C)determine what needs to be backed up
D)find facts
D
3
Typically organizations conduct __________ analyses to determine where they stand with relation to their competitors or to the market as a whole.
SWOT
4
A type of attack waged on a network in an attempt to flood the network,thereby preventing legitimate access,is called a(n)__________ attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
5
What type of threat occurs when a Web page is faked to look exactly like a legitimate company's Web page?
A)Repudiation
B)Denial of Service
C)Tampering
D)Spoofing
A)Repudiation
B)Denial of Service
C)Tampering
D)Spoofing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
6
Any attack that gains someone information can result in that information being used to __________ others into revealing even more information to the hacker or to trusting that person with business to which they should not be a party.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
7
Although it is important to not assign blame for things that went badly,it is often beneficial to _________ to give kudos for things that went particularly well.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following is a tool that not only exposes threats to an organization,but points out strengths as well?
A)Denial of Service
B)SWOT analysis
C)Threat tree
D)Repudiation
A)Denial of Service
B)SWOT analysis
C)Threat tree
D)Repudiation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
9
What is the next vital step after a recovery test?
A)Decide where to place blame on the things that went wrong.
B)Meet as a team and discuss lessons learned.
C)Determine the order in which backups need to be restored.
D)All of the above.
A)Decide where to place blame on the things that went wrong.
B)Meet as a team and discuss lessons learned.
C)Determine the order in which backups need to be restored.
D)All of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
10
It may even be to an organization's benefit to schedule at least _________ dedicated to finding all the places where the system can be broken.
A)one recovery meeting that is
B)two recovery meetings that are
C)one test cycle that is
D)two test cycles that are
A)one recovery meeting that is
B)two recovery meetings that are
C)one test cycle that is
D)two test cycles that are
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
11
The meetings about changes that need to be made should occur as soon as possible __________ the recovery test.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which threat analysis involves the use of backdoors?
A)Discoverable
B)Users/Systems Affected
C)Exploitable
D)Reproducible.
A)Discoverable
B)Users/Systems Affected
C)Exploitable
D)Reproducible.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
13
Ideally,every threat should be addressed __________ as it is a gap,a place where your organization may find that it is in danger of a future disaster,or at the very least an emergency situation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
14
It is often beneficial to the team to praise __________ achievements.
A)even minor
B)only major
C)only non-team members'
D)only team members'
A)even minor
B)only major
C)only non-team members'
D)only team members'
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which of the SWOT terms point out places where an organization might have core competencies or a competitive edge over the competition?
A)Strengths
B)Weaknesses
C)Opportunities
D)Threats
A)Strengths
B)Weaknesses
C)Opportunities
D)Threats
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
16
What can be learned from a failed recovery test?
A)the time necessary for a full recovery
B)the list of possible disasters
C)the existence of forgotten applications that were not backed up
D)all of the above
A)the time necessary for a full recovery
B)the list of possible disasters
C)the existence of forgotten applications that were not backed up
D)all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
17
What usually follows the fact-finding meetings which follow a recovery,whether drill or real?
A)changes to the recovery plan
B)a completely new recovery plan
C)blame for failure is assigned as needed
D)a walk-through test
A)changes to the recovery plan
B)a completely new recovery plan
C)blame for failure is assigned as needed
D)a walk-through test
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of the following is a diagram showing a hierarchy of threats or vulnerabilities?
A)Threat tree
B)Spoofing
C)Denial of Service
D)Repudiation
A)Threat tree
B)Spoofing
C)Denial of Service
D)Repudiation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
19
It is important,before the team has too long of a period of downtime to forget,that they meet at least once to discuss what was done well,what was done poorly,and what was _________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
20
Once you discover a threat at the recovery site which of the following is important to analyze?
A)Exploitable
B)Reproducible
C)Users/Systems Affected
D)Discoverable
A)Exploitable
B)Reproducible
C)Users/Systems Affected
D)Discoverable
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
21
__________ in some operating systems are well known by some people,and they are more than capable of testing systems to see if one is open.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
22
Match between columns
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck