Complete Questions And Correct Detailed
Answers (Verified Answers) |Brand New Version!!
Save
Practice questions for this set
Learn 1 /7 Study with Learn
The primary risks associated with the User Domain of a typical IT infrastructure
are related to:
Choose an answer
1 legal compliance. 2 shoulder surfing
3 hacking 4 social engineering
Don't know?
Terms in this set (165)
,__________ provide the Procedures, policies
detailed steps needed to
carry out ___________.
A __________ grants the right, permission
authority to perform an
action on a system. A
__________ grants access to a
resource.
A business continuity plan security plan
(BCP) is an example of
a(n):
A hacker wants to launch a packet analyzer
an attack on an
organization. The hacker
uses a tool to capture data
sent over the network in
cleartext, hoping to
gather information that
will help make the attack
successful. What tool is
the hacker using?
A threat is any activity that assessments
represents a possible
danger, which includes
any circumstances or
events with the potential
to cause an adverse
impact on all of the
following, except:
A(n) ____________ assessment exploit
attempts to identify
vulnerabilities that can be
exploited.
, An access control such as Social engineering
a firewall or intrusion
prevention system cannot
protect against which of
the following?
Another term for data input validation
range and reasonableness
checks is:
Background checks, procedural controls.
software testing, and
awareness training are all
categories of:
Bill is a security Public key infrastructure (PKI)
professional. He is in a
meeting with co-workers
and describes a system
that will make web
sessions more secure. He
says when a user connects
to the web server and
starts a secure session, the
server sends a certificate
to the user. The certificate
includes a public key. The
user can encrypt data with
the public key and send it
to the server. Because the
server holds the private
key, it can decrypt the
data. Because no other
entity has the private key,
no one else can decrypt
the data. What is Bill
describing?