865 538
Quiz by , created more than 1 year ago

vulnerability assessment and mitigating attacks

36
0
0
865 538
Created by 865 538 almost 8 years ago
Close

nsf_04(15)

Question 1 of 10

1

A security weakness is known as a(n) ____.

Select one of the following:

  • a. threat

  • b. vulnerability

  • c. opportunity

  • d. risk

Explanation

Question 2 of 10

1

A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic, yet they are actually imitations of real data files.

Select one of the following:

  • a. write blocker

  • b. honeypot

  • c. port scanner

  • d. honeycomb

Explanation

Question 3 of 10

1

A(n) ____ is hardware or software that captures packets to decode and analyze its contents.

Select one of the following:

  • a. application analyzer

  • b. threat profiler

  • c. protocol analyzer

  • d. system analyzer

Explanation

Question 4 of 10

1

The end product of a penetration test is the penetration ____.

Select one of the following:

  • a. test profile

  • b. test view

  • c. test system

  • d. test report

Explanation

Question 5 of 10

1

When performing a vulnerability assessment, many organizations use ____ software to search a system for any port vulnerabilities.

Select one of the following:

  • a. application profiler

  • b. vulnerability profiler

  • c. threat scanner

  • d. port scanner

Explanation

Question 6 of 10

1

____ is the probability that a risk will occur in a particular year.

Select one of the following:

  • a. EF

  • b. SLE

  • c. ALE

  • d. ARO

Explanation

Question 7 of 10

1

____ is the proportion of an asset’s value that is likely to be destroyed by a particular risk.

Select one of the following:

  • a. ARO

  • b. SLE

  • c. ER

  • d. EF

Explanation

Question 8 of 10

1

If port 20 is available, then an attacker can assume that FTP is being used.

Select one of the following:

  • True
  • False

Explanation

Question 9 of 10

1

A ____ is a network set up with intentional vulnerabilities.

Select one of the following:

  • a. honeypot

  • b. honeynet

  • c. honeycomb

  • d. honey hole

Explanation

Question 10 of 10

1

A ____ in effect takes a snapshot of the current security of the organization.

Select one of the following:

  • a. risk assessment

  • b. threat analysis

  • c. threat assessment

  • d. vulnerability appraisal

Explanation