100% Pass
Well elaborated questions and answers
A person skilled in attacking computer systems, who uses those skills as a security
expert to help protect systems, is a - ANSWERSwhite-hat hacker
AUP stands for? - ANSWERSAcceptable Use Policy
CIA properties do not include: - ANSWERSauthentication
What is a worm? - ANSWERSMalware
When you analyze a system using the six-phase security process, you are performing a
- ANSWERSrisk assessment
This yields a more specific set of attacks tied to our particular threat agents -
ANSWERSAttack Matrix
An attempt by a threat agent to exploit assets without permission is referred to as -
ANSWERSan attack,
A threat agent is an individual, organization, or group that originates a particular threat
action, motivated to attack asset
A security analyst is performing a security assessment. The analyst should not -
ANSWERStake actions to mitigate a serious risk
There are three types of tokens; they do not include which
A. Offensive tokens
B. One-time password tokens
C. Challenge-response tokens
D. Passive tokens - ANSWERSOffensive tokens
The most recent listed hash algorithm is what? - ANSWERSSHA-512
The following risks are associated with a weak threat except.
A. Simple trial and error password guessing
B. Shoulder surfing
C. Searching for a written password
D. All are risks associated with a weak threat - ANSWERSAll are risks associated with a
weak threat
The following are fundamental strategies for authenticating people on computer
systems except: