Zusammenfassung der Ressource
Frage 1
Frage
A security weakness is known as a(n) ____.
Antworten
-
a. threat
-
b. vulnerability
-
c. opportunity
-
d. risk
Frage 2
Frage
A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic, yet they are actually imitations of real data files.
Antworten
-
a. write blocker
-
b. honeypot
-
c. port scanner
-
d. honeycomb
Frage 3
Frage
A(n) ____ is hardware or software that captures packets to decode and analyze its contents.
Antworten
-
a. application analyzer
-
b. threat profiler
-
c. protocol analyzer
-
d. system analyzer
Frage 4
Frage
The end product of a penetration test is the penetration ____.
Antworten
-
a. test profile
-
b. test view
-
c. test system
-
d. test report
Frage 5
Frage
When performing a vulnerability assessment, many organizations use ____ software to search a system for any port vulnerabilities.
Frage 6
Frage
____ is the probability that a risk will occur in a particular year.
Antworten
-
a. EF
-
b. SLE
-
c. ALE
-
d. ARO
Frage 7
Frage
____ is the proportion of an asset’s value that is likely to be destroyed by a particular risk.
Antworten
-
a. ARO
-
b. SLE
-
c. ER
-
d. EF
Frage 8
Frage
If port 20 is available, then an attacker can assume that FTP is being used.
Frage 9
Frage
A ____ is a network set up with intentional vulnerabilities.
Antworten
-
a. honeypot
-
b. honeynet
-
c. honeycomb
-
d. honey hole
Frage 10
Frage
A ____ in effect takes a snapshot of the current security of the organization.