Deck 9: Continued Assessment of Needs, Threats, and Solutions

ملء الشاشة (f)
exit full mode
سؤال
__________ occurs when the spoofer sets up a redirection of a domain name from its intended IP address destination to an alternative destination in order to gain access to sensitive information.

A)Spoofing
B)Pharming
C)Tampering
D)Repudiation.
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
It is important that the meetings conducted after a test not become a place to judge either processes or people but to __________.

A)determine success or failure
B)develop a test plan
C)determine what needs to be backed up
D)find facts
سؤال
Typically organizations conduct __________ analyses to determine where they stand with relation to their competitors or to the market as a whole.
سؤال
A type of attack waged on a network in an attempt to flood the network,thereby preventing legitimate access,is called a(n)__________ attack.
سؤال
What type of threat occurs when a Web page is faked to look exactly like a legitimate company's Web page?

A)Repudiation
B)Denial of Service
C)Tampering
D)Spoofing
سؤال
Any attack that gains someone information can result in that information being used to __________ others into revealing even more information to the hacker or to trusting that person with business to which they should not be a party.
سؤال
Although it is important to not assign blame for things that went badly,it is often beneficial to _________ to give kudos for things that went particularly well.
سؤال
Which of the following is a tool that not only exposes threats to an organization,but points out strengths as well?

A)Denial of Service
B)SWOT analysis
C)Threat tree
D)Repudiation
سؤال
What is the next vital step after a recovery test?

A)Decide where to place blame on the things that went wrong.
B)Meet as a team and discuss lessons learned.
C)Determine the order in which backups need to be restored.
D)All of the above.
سؤال
It may even be to an organization's benefit to schedule at least _________ dedicated to finding all the places where the system can be broken.

A)one recovery meeting that is
B)two recovery meetings that are
C)one test cycle that is
D)two test cycles that are
سؤال
The meetings about changes that need to be made should occur as soon as possible __________ the recovery test.
سؤال
Which threat analysis involves the use of backdoors?

A)Discoverable
B)Users/Systems Affected
C)Exploitable
D)Reproducible.
سؤال
Ideally,every threat should be addressed __________ as it is a gap,a place where your organization may find that it is in danger of a future disaster,or at the very least an emergency situation.
سؤال
It is often beneficial to the team to praise __________ achievements.

A)even minor
B)only major
C)only non-team members'
D)only team members'
سؤال
Which of the SWOT terms point out places where an organization might have core competencies or a competitive edge over the competition?

A)Strengths
B)Weaknesses
C)Opportunities
D)Threats
سؤال
What can be learned from a failed recovery test?

A)the time necessary for a full recovery
B)the list of possible disasters
C)the existence of forgotten applications that were not backed up
D)all of the above
سؤال
What usually follows the fact-finding meetings which follow a recovery,whether drill or real?

A)changes to the recovery plan
B)a completely new recovery plan
C)blame for failure is assigned as needed
D)a walk-through test
سؤال
Which of the following is a diagram showing a hierarchy of threats or vulnerabilities?

A)Threat tree
B)Spoofing
C)Denial of Service
D)Repudiation
سؤال
It is important,before the team has too long of a period of downtime to forget,that they meet at least once to discuss what was done well,what was done poorly,and what was _________
سؤال
Once you discover a threat at the recovery site which of the following is important to analyze?

A)Exploitable
B)Reproducible
C)Users/Systems Affected
D)Discoverable
سؤال
__________ in some operating systems are well known by some people,and they are more than capable of testing systems to see if one is open.
سؤال
Match between columns
Denial of Service
one person or entity electronically masquerading as another by falsifying data, redirecting URLs, or redirecting messages to an alternative site
Denial of Service
to interfere or meddle with in order to damage or corrupt
Denial of Service
ability of an organization to ensure the security and recoverability of their cryptographic keys
Denial of Service
a type of attack waged on a network in an attempt to flood the network, thereby bringing the network to its knees
Denial of Service
tool that is useful in setting up the test for threats
Denial of Service
things that were done particularly well
Denial of Service
didn’t work as well as it should have
Denial of Service
can be used to make better use of resources
Denial of Service
situations that endanger the organization‘s security
Opportunities
one person or entity electronically masquerading as another by falsifying data, redirecting URLs, or redirecting messages to an alternative site
Opportunities
to interfere or meddle with in order to damage or corrupt
Opportunities
ability of an organization to ensure the security and recoverability of their cryptographic keys
Opportunities
a type of attack waged on a network in an attempt to flood the network, thereby bringing the network to its knees
Opportunities
tool that is useful in setting up the test for threats
Opportunities
things that were done particularly well
Opportunities
didn’t work as well as it should have
Opportunities
can be used to make better use of resources
Opportunities
situations that endanger the organization‘s security
Spoofing
one person or entity electronically masquerading as another by falsifying data, redirecting URLs, or redirecting messages to an alternative site
Spoofing
to interfere or meddle with in order to damage or corrupt
Spoofing
ability of an organization to ensure the security and recoverability of their cryptographic keys
Spoofing
a type of attack waged on a network in an attempt to flood the network, thereby bringing the network to its knees
Spoofing
tool that is useful in setting up the test for threats
Spoofing
things that were done particularly well
Spoofing
didn’t work as well as it should have
Spoofing
can be used to make better use of resources
Spoofing
situations that endanger the organization‘s security
Weaknesses
one person or entity electronically masquerading as another by falsifying data, redirecting URLs, or redirecting messages to an alternative site
Weaknesses
to interfere or meddle with in order to damage or corrupt
Weaknesses
ability of an organization to ensure the security and recoverability of their cryptographic keys
Weaknesses
a type of attack waged on a network in an attempt to flood the network, thereby bringing the network to its knees
Weaknesses
tool that is useful in setting up the test for threats
Weaknesses
things that were done particularly well
Weaknesses
didn’t work as well as it should have
Weaknesses
can be used to make better use of resources
Weaknesses
situations that endanger the organization‘s security
Repudiation
one person or entity electronically masquerading as another by falsifying data, redirecting URLs, or redirecting messages to an alternative site
Repudiation
to interfere or meddle with in order to damage or corrupt
Repudiation
ability of an organization to ensure the security and recoverability of their cryptographic keys
Repudiation
a type of attack waged on a network in an attempt to flood the network, thereby bringing the network to its knees
Repudiation
tool that is useful in setting up the test for threats
Repudiation
things that were done particularly well
Repudiation
didn’t work as well as it should have
Repudiation
can be used to make better use of resources
Repudiation
situations that endanger the organization‘s security
Tampering
one person or entity electronically masquerading as another by falsifying data, redirecting URLs, or redirecting messages to an alternative site
Tampering
to interfere or meddle with in order to damage or corrupt
Tampering
ability of an organization to ensure the security and recoverability of their cryptographic keys
Tampering
a type of attack waged on a network in an attempt to flood the network, thereby bringing the network to its knees
Tampering
tool that is useful in setting up the test for threats
Tampering
things that were done particularly well
Tampering
didn’t work as well as it should have
Tampering
can be used to make better use of resources
Tampering
situations that endanger the organization‘s security
Threat Tree
one person or entity electronically masquerading as another by falsifying data, redirecting URLs, or redirecting messages to an alternative site
Threat Tree
to interfere or meddle with in order to damage or corrupt
Threat Tree
ability of an organization to ensure the security and recoverability of their cryptographic keys
Threat Tree
a type of attack waged on a network in an attempt to flood the network, thereby bringing the network to its knees
Threat Tree
tool that is useful in setting up the test for threats
Threat Tree
things that were done particularly well
Threat Tree
didn’t work as well as it should have
Threat Tree
can be used to make better use of resources
Threat Tree
situations that endanger the organization‘s security
Threats
one person or entity electronically masquerading as another by falsifying data, redirecting URLs, or redirecting messages to an alternative site
Threats
to interfere or meddle with in order to damage or corrupt
Threats
ability of an organization to ensure the security and recoverability of their cryptographic keys
Threats
a type of attack waged on a network in an attempt to flood the network, thereby bringing the network to its knees
Threats
tool that is useful in setting up the test for threats
Threats
things that were done particularly well
Threats
didn’t work as well as it should have
Threats
can be used to make better use of resources
Threats
situations that endanger the organization‘s security
Strengths
one person or entity electronically masquerading as another by falsifying data, redirecting URLs, or redirecting messages to an alternative site
Strengths
to interfere or meddle with in order to damage or corrupt
Strengths
ability of an organization to ensure the security and recoverability of their cryptographic keys
Strengths
a type of attack waged on a network in an attempt to flood the network, thereby bringing the network to its knees
Strengths
tool that is useful in setting up the test for threats
Strengths
things that were done particularly well
Strengths
didn’t work as well as it should have
Strengths
can be used to make better use of resources
Strengths
situations that endanger the organization‘s security
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/22
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 9: Continued Assessment of Needs, Threats, and Solutions
1
__________ occurs when the spoofer sets up a redirection of a domain name from its intended IP address destination to an alternative destination in order to gain access to sensitive information.

A)Spoofing
B)Pharming
C)Tampering
D)Repudiation.
B
2
It is important that the meetings conducted after a test not become a place to judge either processes or people but to __________.

A)determine success or failure
B)develop a test plan
C)determine what needs to be backed up
D)find facts
D
3
Typically organizations conduct __________ analyses to determine where they stand with relation to their competitors or to the market as a whole.
SWOT
4
A type of attack waged on a network in an attempt to flood the network,thereby preventing legitimate access,is called a(n)__________ attack.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
5
What type of threat occurs when a Web page is faked to look exactly like a legitimate company's Web page?

A)Repudiation
B)Denial of Service
C)Tampering
D)Spoofing
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
6
Any attack that gains someone information can result in that information being used to __________ others into revealing even more information to the hacker or to trusting that person with business to which they should not be a party.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
7
Although it is important to not assign blame for things that went badly,it is often beneficial to _________ to give kudos for things that went particularly well.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
8
Which of the following is a tool that not only exposes threats to an organization,but points out strengths as well?

A)Denial of Service
B)SWOT analysis
C)Threat tree
D)Repudiation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
9
What is the next vital step after a recovery test?

A)Decide where to place blame on the things that went wrong.
B)Meet as a team and discuss lessons learned.
C)Determine the order in which backups need to be restored.
D)All of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
10
It may even be to an organization's benefit to schedule at least _________ dedicated to finding all the places where the system can be broken.

A)one recovery meeting that is
B)two recovery meetings that are
C)one test cycle that is
D)two test cycles that are
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
11
The meetings about changes that need to be made should occur as soon as possible __________ the recovery test.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
12
Which threat analysis involves the use of backdoors?

A)Discoverable
B)Users/Systems Affected
C)Exploitable
D)Reproducible.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
13
Ideally,every threat should be addressed __________ as it is a gap,a place where your organization may find that it is in danger of a future disaster,or at the very least an emergency situation.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
14
It is often beneficial to the team to praise __________ achievements.

A)even minor
B)only major
C)only non-team members'
D)only team members'
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
15
Which of the SWOT terms point out places where an organization might have core competencies or a competitive edge over the competition?

A)Strengths
B)Weaknesses
C)Opportunities
D)Threats
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
16
What can be learned from a failed recovery test?

A)the time necessary for a full recovery
B)the list of possible disasters
C)the existence of forgotten applications that were not backed up
D)all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
17
What usually follows the fact-finding meetings which follow a recovery,whether drill or real?

A)changes to the recovery plan
B)a completely new recovery plan
C)blame for failure is assigned as needed
D)a walk-through test
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of the following is a diagram showing a hierarchy of threats or vulnerabilities?

A)Threat tree
B)Spoofing
C)Denial of Service
D)Repudiation
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
19
It is important,before the team has too long of a period of downtime to forget,that they meet at least once to discuss what was done well,what was done poorly,and what was _________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
20
Once you discover a threat at the recovery site which of the following is important to analyze?

A)Exploitable
B)Reproducible
C)Users/Systems Affected
D)Discoverable
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
21
__________ in some operating systems are well known by some people,and they are more than capable of testing systems to see if one is open.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
22
Match between columns
Denial of Service
one person or entity electronically masquerading as another by falsifying data, redirecting URLs, or redirecting messages to an alternative site
Denial of Service
to interfere or meddle with in order to damage or corrupt
Denial of Service
ability of an organization to ensure the security and recoverability of their cryptographic keys
Denial of Service
a type of attack waged on a network in an attempt to flood the network, thereby bringing the network to its knees
Denial of Service
tool that is useful in setting up the test for threats
Denial of Service
things that were done particularly well
Denial of Service
didn’t work as well as it should have
Denial of Service
can be used to make better use of resources
Denial of Service
situations that endanger the organization‘s security
Opportunities
one person or entity electronically masquerading as another by falsifying data, redirecting URLs, or redirecting messages to an alternative site
Opportunities
to interfere or meddle with in order to damage or corrupt
Opportunities
ability of an organization to ensure the security and recoverability of their cryptographic keys
Opportunities
a type of attack waged on a network in an attempt to flood the network, thereby bringing the network to its knees
Opportunities
tool that is useful in setting up the test for threats
Opportunities
things that were done particularly well
Opportunities
didn’t work as well as it should have
Opportunities
can be used to make better use of resources
Opportunities
situations that endanger the organization‘s security
Spoofing
one person or entity electronically masquerading as another by falsifying data, redirecting URLs, or redirecting messages to an alternative site
Spoofing
to interfere or meddle with in order to damage or corrupt
Spoofing
ability of an organization to ensure the security and recoverability of their cryptographic keys
Spoofing
a type of attack waged on a network in an attempt to flood the network, thereby bringing the network to its knees
Spoofing
tool that is useful in setting up the test for threats
Spoofing
things that were done particularly well
Spoofing
didn’t work as well as it should have
Spoofing
can be used to make better use of resources
Spoofing
situations that endanger the organization‘s security
Weaknesses
one person or entity electronically masquerading as another by falsifying data, redirecting URLs, or redirecting messages to an alternative site
Weaknesses
to interfere or meddle with in order to damage or corrupt
Weaknesses
ability of an organization to ensure the security and recoverability of their cryptographic keys
Weaknesses
a type of attack waged on a network in an attempt to flood the network, thereby bringing the network to its knees
Weaknesses
tool that is useful in setting up the test for threats
Weaknesses
things that were done particularly well
Weaknesses
didn’t work as well as it should have
Weaknesses
can be used to make better use of resources
Weaknesses
situations that endanger the organization‘s security
Repudiation
one person or entity electronically masquerading as another by falsifying data, redirecting URLs, or redirecting messages to an alternative site
Repudiation
to interfere or meddle with in order to damage or corrupt
Repudiation
ability of an organization to ensure the security and recoverability of their cryptographic keys
Repudiation
a type of attack waged on a network in an attempt to flood the network, thereby bringing the network to its knees
Repudiation
tool that is useful in setting up the test for threats
Repudiation
things that were done particularly well
Repudiation
didn’t work as well as it should have
Repudiation
can be used to make better use of resources
Repudiation
situations that endanger the organization‘s security
Tampering
one person or entity electronically masquerading as another by falsifying data, redirecting URLs, or redirecting messages to an alternative site
Tampering
to interfere or meddle with in order to damage or corrupt
Tampering
ability of an organization to ensure the security and recoverability of their cryptographic keys
Tampering
a type of attack waged on a network in an attempt to flood the network, thereby bringing the network to its knees
Tampering
tool that is useful in setting up the test for threats
Tampering
things that were done particularly well
Tampering
didn’t work as well as it should have
Tampering
can be used to make better use of resources
Tampering
situations that endanger the organization‘s security
Threat Tree
one person or entity electronically masquerading as another by falsifying data, redirecting URLs, or redirecting messages to an alternative site
Threat Tree
to interfere or meddle with in order to damage or corrupt
Threat Tree
ability of an organization to ensure the security and recoverability of their cryptographic keys
Threat Tree
a type of attack waged on a network in an attempt to flood the network, thereby bringing the network to its knees
Threat Tree
tool that is useful in setting up the test for threats
Threat Tree
things that were done particularly well
Threat Tree
didn’t work as well as it should have
Threat Tree
can be used to make better use of resources
Threat Tree
situations that endanger the organization‘s security
Threats
one person or entity electronically masquerading as another by falsifying data, redirecting URLs, or redirecting messages to an alternative site
Threats
to interfere or meddle with in order to damage or corrupt
Threats
ability of an organization to ensure the security and recoverability of their cryptographic keys
Threats
a type of attack waged on a network in an attempt to flood the network, thereby bringing the network to its knees
Threats
tool that is useful in setting up the test for threats
Threats
things that were done particularly well
Threats
didn’t work as well as it should have
Threats
can be used to make better use of resources
Threats
situations that endanger the organization‘s security
Strengths
one person or entity electronically masquerading as another by falsifying data, redirecting URLs, or redirecting messages to an alternative site
Strengths
to interfere or meddle with in order to damage or corrupt
Strengths
ability of an organization to ensure the security and recoverability of their cryptographic keys
Strengths
a type of attack waged on a network in an attempt to flood the network, thereby bringing the network to its knees
Strengths
tool that is useful in setting up the test for threats
Strengths
things that were done particularly well
Strengths
didn’t work as well as it should have
Strengths
can be used to make better use of resources
Strengths
situations that endanger the organization‘s security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 22 في هذه المجموعة.