Fundamentals of Information Security - C836: Pre-Assessment: Questions And Answers Latest Updated 2024 With Complete Solution.
Which cybersecurity term is defined as the potential for an attack on a resource? - CORRECT ANSWER-Threat Which security type deliberately exposes a system's vulnerabilities or resources to an attacker? - CORRECT ANSWER-Honeypots Which tool can be used to map devices on a network, along with their operating system types and versions? - CORRECT ANSWER-Port scanner Which web attack is a server-side attack? - CORRECT ANSWER-SQL injection An organization employs a VPN to safeguard its information. Which security principle is protected by a VPN? - CORRECT ANSWER-Data in motion A malicious hacker was successful in a denial of service (DoS) attack against an institution's mail server. Fortunately, no data was lost or altered while the server was offline. Which type of attack is this? - CORRECT ANSWER-Interruption A company has had server successful denial of service (DoS) attacks on its email server. Which security principle is being attacked? - CORRECT ANSWER-Availability A new start-up company has started working on a social networking website. The company has moved all its source code to a cloud provider and wants to protect this source code from unauthorized access. Which cyber defense concept should the start-up company use to maintain the confidentiality of its
Escuela, estudio y materia
- Institución
- Fundamentals of Information Security - C836: Pre-A
- Grado
- Fundamentals of Information Security - C836: Pre-A
Información del documento
- Subido en
- 23 de marzo de 2024
- Número de páginas
- 10
- Escrito en
- 2023/2024
- Tipo
- Examen
- Contiene
- Preguntas y respuestas
Temas
-
fundamentals of information security c836 pre a
Documento también disponible en un lote