nsf_04(15)

Descripción

vulnerability assessment and mitigating attacks
865 538
Test por 865 538, actualizado hace más de 1 año
865 538
Creado por 865 538 hace más de 7 años
33
0

Resumen del Recurso

Pregunta 1

Pregunta
A security weakness is known as a(n) ____.
Respuesta
  • a. threat
  • b. vulnerability
  • c. opportunity
  • d. risk

Pregunta 2

Pregunta
A ____ is a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic, yet they are actually imitations of real data files.
Respuesta
  • a. write blocker
  • b. honeypot
  • c. port scanner
  • d. honeycomb

Pregunta 3

Pregunta
A(n) ____ is hardware or software that captures packets to decode and analyze its contents.
Respuesta
  • a. application analyzer
  • b. threat profiler
  • c. protocol analyzer
  • d. system analyzer

Pregunta 4

Pregunta
The end product of a penetration test is the penetration ____.
Respuesta
  • a. test profile
  • b. test view
  • c. test system
  • d. test report

Pregunta 5

Pregunta
When performing a vulnerability assessment, many organizations use ____ software to search a system for any port vulnerabilities.
Respuesta
  • a. application profiler
  • b. vulnerability profiler
  • c. threat scanner
  • d. port scanner

Pregunta 6

Pregunta
____ is the probability that a risk will occur in a particular year.
Respuesta
  • a. EF
  • b. SLE
  • c. ALE
  • d. ARO

Pregunta 7

Pregunta
____ is the proportion of an asset’s value that is likely to be destroyed by a particular risk.
Respuesta
  • a. ARO
  • b. SLE
  • c. ER
  • d. EF

Pregunta 8

Pregunta
If port 20 is available, then an attacker can assume that FTP is being used.
Respuesta
  • True
  • False

Pregunta 9

Pregunta
A ____ is a network set up with intentional vulnerabilities.
Respuesta
  • a. honeypot
  • b. honeynet
  • c. honeycomb
  • d. honey hole

Pregunta 10

Pregunta
A ____ in effect takes a snapshot of the current security of the organization.
Respuesta
  • a. risk assessment
  • b. threat analysis
  • c. threat assessment
  • d. vulnerability appraisal
Mostrar resumen completo Ocultar resumen completo

Similar

nsf_03
865 538
nz ns gm
Gene Miranda
nsf_02
865 538
nsf_05(4)
865 538
nsf_06(7)
865 538
nsf_09(11)
865 538
nsf_01
865 538
nsf_07(8)
865 538
nsf_08(9)
865 538
Dioses
Andres Tejada
Esquema resumen de la Prehistoria
Francisco Ayén