// // // // // // //
Which //term //below //is //frequently //used //to //describe //the //tasks //of //securing //information //that
//is //in //a //digital //format? //- //CORRECT //ANSWERS(S)✔✔information //security
What /
/language /
/below /
/is /
/used /
/to /
/view /
/and /
/manipulate //data //that //is //stored //in //a //relational //database? //- //CORRECT //ANSWERS(S)✔✔SQL
What /
/type /
/of /
/attack /
/is /
/targeted /
/against //
a/
/smaller /
/group /
/of /
/specific /
/individuals, /
/such /
/as /
/the /
/major /
/executives /
/working //for //a //manufacturing //company? //- //CORRECT //ANSWERS(S)✔✔Watering //Hole
,What /
/type /
/of /
/theft /
/involves /
/stealing /
/another /
/person's /
/personal //information, //such //as //a //Social //Security //number, //and //then //using //the //information
//to /
/impersonate /
/the //victim, //generally //for //financial //gain? //- //CORRECT //ANSWERS(S)✔✔Identity //theft
A/
/Hardware /
/Security /
/Module /
/(HSM) /
/is /
/essentially //
a/
/chip /
/on /
/the /
/motherboard /
/of //the //computer //that //provides //cryptographic //services. //- //CORRECT //ANSWERS(S)✔✔False
XSS /
/attacks /
/occur /
/when /
/an /
/attacker /
/takes /
/advantage /
,/of /
/web /
/applications /
/that /
/accept /
/user /
/input /
/without /
/validating //it //and //then //present //it //back //to //the //user. //- //CORRECT //ANSWERS(S)✔✔True
An /
/independently /
/rotating /
/large /
/cup /
/affixed /
/to /
/the /
/top /
/of //
a/
/fence /
/prevents /
/the /
/hands /
/of /
/intruders /
/from /
/gripping /
/the /
/top /
/of //
a/
/fence /
/to /
/climb /
/over //it. //What //is //the //name //for //this //technology? //- //CORRECT //ANSWERS(S)✔✔roller //barrier
, In /
/information /
/security, /
/an /
/example /
/of //
a/
/threat /
/agent /
/can /
/be /
/____. //- /
/CORRECT /
/ANSWERS(S)✔✔- //
a //force //of //nature //such //as //a //tornado //that //could //destroy //computer //equipment
- a //virus //that //attacks //a //computer //network
// //
- //A //person //attempting //to //break //into //a //secure //computer //network
Script //kiddies //acquire //which //item //below //from //other //attackers //to //easily //craft //an //attack: //-
//CORRECT //ANSWERS(S)✔✔Exploit //kit
What /
/type /
/of /
/device, /
/sometimes /
/called //
a/
/packet //filter, //is //designed //to //prevent //malicious //network //packets //from //entering //or //leaving
//computers //or //networks? //- //CORRECT //ANSWERS(S)✔✔firewall
Of /
/the /