Ovido
Språk
  • Engelska
  • Spanska
  • Franska
  • Portugisiska
  • Tyska
  • Italienska
  • Nederländska
  • Svenska
Text
  • Stora bokstäver

Användare

  • Logga in
  • Skapa konto
  • Uppgradera till Premium
Ovido
  • Hem
  • Logga in
  • Skapa konto

cyber security 1-3

An organization that practices purchasing products from different vendors is demonstrating which security principle?

Diversity

Gunnar is creating a document that explains risk response techniques. Which of the following would he NOT list and explain in his document?

Extinguish risk

Which of the following is NOT a successive layer in which information security is achieved?

Purposes

Which tool is most commonly associated with nation state threat actors?

Advanced Persistent Threat (APT)

Signe wants to improve the security of the small business where she serves as a security manager. She determines that the business needs to do a better job of not revealing the type of computer, operating system, software, and network connections they use. What security principle does Signe want to use?

Obscurity

What is the category of threat actors that sell their knowledge of vulnerabilities to other attackers or governments?

Brokers

Which of the following is NOT true regarding security?

Security is a war that must be won at all costs.

Tatyana is discussing with her supervisor potential reasons why a recent attack was successful against one of their systems. Which of the following configuration issues would NOT be covered?

Vulnerable business processes

lan recently earned his security certification and has been offered a promotion to a position that requires him to analyze and design security solutions as well as identifying users' needs. Which of these generally recognized security positions has lan been offered?

Security administrator

Which of the following is an enterprise critical asset?

Information

What are industry-standard frameworks and reference architectures that are required by external agencies known as?

Regulatory

Why do cyberterrorists target power plants, air traffic control centers, and water systems?

They can cause significant disruption by destroying only a few targets.

Which act requires banks and financial institutions to alert their customers of their policies in disclosing customer information?

Gramm-Leach-Bliley Act (GLBA)

What is an objective of state-sponsored attackers?

To spy on citizens

Alyona has been asked by her supervisor to give a presentation regarding reasons why security attacks continue to be successful. She has decided to focus on the issue of widespread vulnerabilities. Which of the following would Alyona NOT include in her presentation?

Misconfigurations

Which of the following ensures that only authorized parties can view protected information?

Confidentiality

Adone is attempting to explain to his friend the relationship between security and convenience. Which of the following statements would he use?

Security and convenience are inversely proportional.

What is a race condition?

When two concurrent threads of execution access a shared resource simultaneously, resulting in unintended consequences.

Complete this definition of information security: That which protects the integrity, confidentiality, and availability of information

through products, people, and procedures on the devices that store, manipulate, and transmit the information

Which of the choices shown are NOT true when considering virus behavior?

Can infect targets unassisted over the network.

Which of the choices shown is NOT considered a characteristic of malware?

• Circulation

• Concealment

• Infection

• Payload

All of these choices are correct.

Which of the choices identifies the actions of a rootkit?

Become undetectable

Which of the choices is NOT a trait of crypto-malware?

Collects private information

Which malware type would be used to infect cloud based storage?

Crypto-malware

Proxies are "devices" that are strictly software-only.

False

A web application firewall is exactly the same as a network firewall.

False

A Web application firewall protects Web servers from malicious traffic and blocks attempts to compromise the system. It prevents targeted attacks that include Denial of Service (DOS), Cross-Site Scripting (XSS), SQL injection, Cross-Site Request Forgery (CSRF), forceful browsing, cookie poisoning and invalid input. In which of the following attacks does the attacker gains access to a restricted page within a Web application by supplying a URL directly?

Forceful browsing

Anetwork administrator is evaluating different firewalls. Which of the following firewalls provides protection from the following attacks: Denial of Service (DOS), Cross-Site Scripting (XSS), SQL injection, Cross-Site Request Forgery (CSRF), forceful browsing, cookie poisoning and invalid input?

Web application firewall (WAF)

Which of the following risks does the use of social netowrking and P2P platforms pose?

Social engineering attacks

Under which of the following does "shoulder surfing" fall?

Social engineering

What are the factors that contibute to the effectiveness of social engineering techniques? [Choose all that apply.]

These all apply:
Authority

Intimidation

Scarcity and Urgency

Consensus

Social proof

Familiarity and Trust

Which of these is a
general term used for describing software that gathers information without the user's consent?

spyware

Linnea's father called her to say that a message suddenly
appeared on his screen that says his software license has expired and he must immediately pay $500 to have it renewed before

control of the computer will be returned to him. What type of malware is this?

blocking ransomware

Which of these items retrieved through dumpster diving would NOT provide useful information?

books

What is the name of the threat actor's computer that gives instructions to an infected computer?

Command and control
(C&C) server

Which of the following is NOT a primary trait of malware?

diffusion

Which of the following is defined as following an authorized person through a secure door?

Tailgating

Which type of malware requires a user to transport it from one computer to another?

virus

Which variation of a phishing attack sends phishing messages only to wealthy individuals?

Whaling

How can an attacker use a hoax?

A hoax could convince a user that a bad Trojan is circulating and that he should change his security settings

Which type of mutation completely changes a virus from its original form by rewriting its own code whenever it is executed?

metamorphic

Which of the following is NOT correct about a rootkit?

A rootkit is always the payload of a Trojan

Astrid's computer screen suddenly says that all files are now locked until money is transferred to a specific account, at which time she will receive a means to unlock the files. What type of malware has infected her computer?

Crypto-malware

Which statement regarding a keylogger is NOT true?

Software keyloggers are generally easy to detect

Which of these is a general term used for describing software that gathers information without the user's consent?

Spyware

What is the term used for a threat actor who controls multiple bots in a botnet?

bot herder

Lykke receives a call while working at the helpdesk from someone who needs his account reset immediately.
When Lykke questions the caller, he says, "If you don't reset my account immediately, I will call your supervisor!" What psychological approach is the caller attempting to use on Lykke?

intimidation

Ebba received a message from one of her tech support employees. In violation of company policy, a user had downloaded a free program to receive weather reports, but the program had also installed malware on the computer that gave the threat actor unrestricted access to the computer. What type of malware had been downloaded?

RAT

Which of these could not be defined as a logic bomb?

a. Erase all data if John Smith's name is removed from the list of employees.


b. Reformat the hard drive three months after Susan Jones left the

company.


c. Send spam email to all users in the company on Tuesday.


d. If the company's stock price drops below $10, then credit Jeff Brown with 10 additional years of retirement credit.

Send spam email to all users in the company on Tuesday.

Hedda pretends to be the help desk manager and calls Steve to trick him into giving her his password. What social engineering attack has Hedda performed?

Impersonation

Which of the following is defined as following an authorized person through a secure door?

Tailgating

Each of these is a reason
why adware is scorned

ЕХСЕРТ ?

it displays objectionable content


it can interfere with a user's productivity


it displays the attacker's programming


skills it can cause a computer to crash or slow down

it displays the attacker's programming skills

Which type of malware requires a user to transport it from one computer to another?

Virus

Which of these items retrieved through dumpster diving would NOT provide useful information?

Books

Quiz
HIZTEGIA HARD
HIZTEGIA
PigsPigs
Wordly Wise 3000 lesson 1vocabulary
Teeth
HT (Context) CRIMBS PPWNG
marketing chapter 9
BHV-Toets
home services pricing
Genetics midterm 1
Anthro week 3 flashcards
Antho week 4 quiz
emprical studies introbasics - central tendency, spread
ak se3thema water en bevolking en ruimte
biology B6
unit 6 bio
WC Reading Quiz #2
Study-HOSA
Supply Chain
psychometry
trophosphere geographylol
chemieorganische verbindingsklassen en monofunctionele verbindingsklassen
geography atmosphere
Biologi 5.2 Energi och materia + 5.3
Pathologie orthopedie breuken
spainsh unit 2 b
AP1
Revalida
scince test flash cardsstudyy
French Vocab Test
songbirds and snakes vocab
Spanska glosor
geo110
french
LobstersLobsters
Social Terms Jan-Feb
Pathologie orthopedie bovenste extremiteit
KNSS 307 ( development of human locomotions
KNSS 307( Early Motor Development
Modern studies testmy test
The limbic systemCharlotte
English vocabulary
Pathology unit 1
History quiz 4
Respiritory system
GTF + De taktiska grundprinciperna
Fondamentaux Biologie
Sampling
FL 3 Kommunikationssystem
Films test
Unit 4
NO
geología chuletillas
Capitals
Économie S4
politics essayessay
week 1.2 Term and Lesions
Week 2 - Skin Care 2 Assignment - Emollients and Eve Taylor Lotions, Moisturizer
week 1.2- Extended Health screening
Vocabulary
Japanese Phrases (Everyday)
geologia
Sharks
months and order numbers
Spanska läxa v.5
spanish 2 2A and 2B
phyics 10P1
Réviser les pronoms et les déterminants 5e
georaphymap skills key words
cree
show me tell me motorbikeeee
CELLScan you answer the questions
Geometryanswer these
Forensic science review
Réviser les pronoms et les déterminants 6e
Svenska adjektiv mm A
mineralen
1) Humble 2) Serendipity 3) Tedious 4) Riposte 5) Outlandish 6) Benevolent 7) Ba
english exam gr 10
loayمشهور طالب نشيط
Population Vocab
vitamines
Biology/Nask flashcardsVerrie prittie vlesjkarts meet bij Kirsten for bijoloodjie ent nask prodject
E-nummers
Spierskeletsysteem2 -KTY2
Maths
perception: intro- what is perception - the eye - prisoners ? - evolution -examples -sensation vs perecption -camera model - experimental study
Inför fysik-prov (kapitel 6)
main practice
german 15
multiplying
science
science plants test unit 3
Business test
masu form
C1 Level vocabulary
Unit 1 Animal Diversity
homeworkexam de finance chapitre credit
les genresla hierarchie des genres
englisch chapter 2
gsJa
electronics
los verbos
science studying
matte
light reflection
physicss
combined higher, quantitative chemistry, GCSE flashcardsidk
substances - chemistry
men and women in the family
contraception in islam
Anglais: native americans
IT Management chapters 1-3
latijn
pneumatics and hydraulics
Divorce in islam
History quiz THREE!!!!
Tableau Periodique
frankie capuano biopsychology
gsce japanese words
Organisatiekunde hoofdstuk 10
Albania
te form - JPN
Special dates
Koine Greek Ch. 20-22
enthalpy change
Biology topic 5 and 6Communicable diseases, vaccinations, antibiotics and painkillers, investigating antibiotics, discovering drugs, developing new drugs,
Les dates de la seconde guerre mondiale
sight words
ge se3
geschiedenis
Organisatiekunde hoofdstuk 9
frenchtbh idk
Character Profiles
emergency drill
CricketsCrickets
Examain final sciences
HT (dystopian themes and examples)-themes in every dystopian novels -with examples from HT
Words & Phrases 2
Semaine 4
Santé motricité physio cardio vasculaire
Exambio
Myndigheterden trista delen
cosmetology
Engelska 2
BiologyIn this biology quiz you will have 60s to answer each question , the questions and answers are ranzomized. You can see your rank in the leaderboard after each question.
OKO
kwalitatief onderzoek OKO pb1612
kwalitatief onderzoek
anatomie 2
j-ljudet
english exam
Biology
physics
social studies
SHS - Transformation des organisations et impact sur le travail
SHS - Psychologie
SHS - Sociologie générale
SHS - epistemologie
TKAM final vocab
Spanish Irregular Preterite Verbs
Pathologie orthopedie onderste extremiteit
driving test
Koine Greek Prepositions
Organisatiekunde hoofdstuk 8
nask
WHITECHAPLE
LT - Natural law (CHAPTER 1)
Bio Exam
LT - The legal order (CHAPTER 0)
LT - Law as a rational system (CHAPTER 1)
5 glosor
koine greek ειμί
FL 2 Kommunikationssystem
maatschappijleer.
SOom första världskriget
English Literature
kemi 1 syror & baser begrepp
Ethiek periode 2
Drug tables
general science
Chemistryok
Work
Engelska 1
bio se3thema 6,7,10 & 11
Spanska 4
un mundo de fiestas
chem exam
Automotive
how to improve french vocabulary
types of houses in french
very hard french words
Koine Greek Ch. 18 & 19
french words you will see in french books
various french house terms
parts of the bathroom in french
parts of the bedroom in french
french
The Lung Channel of Hand Taiyin
Anatomy and Physiology
tyska kap 3bräcka till
nl
physics flashcards
TYSKA FERIEN MAL ANDERS
romeo and juliet
Nederlands poëzie begrippenAlle begrippen van de poëzie les Nederlands.
PKG stoornissen jaar 1
PKG jaar 1
nederlands (lezen) hoofdstuk 1,2 en 3 theorie
anglais
Historia Källkritikfkn dö
An inspector calls
Geology
Ireland, the green island
leverspe
Organisatiekunde Hoofdstuk 7
text sobre a Barbie
palavras mais usadas
FL1 Kommunikationssystemtermer inom kommunikationssystem
Grieks 4.1De Ring van Gyges
Busnissmodel
Politiek en economische handel
BMC
English Exam
Staatsrecht 1
The brain & Limbic system
limbic system
art definitions and paintings
french -
french
histoireallo
ee
poets
duits 47 tot 52 4
French speaking mock
b
Psykologi prov
Engels Unit 2
duits 47 tot 52 3
HistoryAbolition of slavery
Natural Disasters
Secu
bio test
Spanska NP Muntligt
spanish
Element 3
Edodontic instruments
duits 47 tot 52 2
duits 47 tot 52
Frans A+B
Grieks 2.2Diotima
Spanish Words & Phrases
vocabulary
pharm
Pharmacie Semester 2
scene 5a
Examin Géo
interior design vocab 2
engels woordjes 2.1 t/m 2.4
Grieks 2.1Aristophanus - Symposium
Physique Chimie Chap 10/11/12
a level human geography
MU AW 2
Ordförråd Substantiv B
Biologi 1 genetik
Economie
KA 4
socials exam 10
History 2
Hinduism terms
Dugga - Iskunskap
spanish verbs
KA3
BIO 112L EYE
Idas teknik begreppstest
toefl c1
nederlands
Glosor kap 11
Le passe compose - the perfect tense ( french )
El begrepp
science summary sheets
2.1. Mon identité
week 1 korean
Mitosis