Fundamentals of Information Security - C836: Pre-Assessment: Questions And Answers Latest Updated 2024 With Complete Solution.
Which cybersecurity term is defined as the potential for an attack on a resource? - CORRECT ANSWER-Threat Which security type deliberately exposes a system's vulnerabilities or resources to an attacker? - CORRECT ANSWER-Honeypots Which tool can be used to map devices on a network, along with their operating system types and versions? - CORRECT ANSWER-Port scanner Which web attack is a server-side attack? - CORRECT ANSWER-SQL injection An organization employs a VPN to safeguard its information. Which security principle is protected by a VPN? - CORRECT ANSWER-Data in motion A malicious hacker was successful in a denial of service (DoS) attack against an institution's mail server. Fortunately, no data was lost or altered while the server was offline. Which type of attack is this? - CORRECT ANSWER-Interruption A company has had server successful denial of service (DoS) attacks on its email server. Which security principle is being attacked? - CORRECT ANSWER-Availability A new start-up company has started working on a social networking website. The company has moved all its source code to a cloud provider and wants to protect this source code from unauthorized access. Which cyber defense concept should the start-up company use to maintain the confidentiality of its
Written for
- Institution
- Fundamentals of Information Security - C836: Pre-A
- Course
- Fundamentals of Information Security - C836: Pre-A
Document information
- Uploaded on
- March 23, 2024
- Number of pages
- 10
- Written in
- 2023/2024
- Type
- Exam (elaborations)
- Contains
- Questions & answers
Subjects
-
fundamentals of information security c836 pre a
Also available in package deal