Quiz


  1. The implicit for a disclaiming episode to take-place is a insecurity.  True
    False

1.00000 summits   

QUESTION 2

  1. Which of the aftercited is an specimen of a user estate insecurity? a.Your laptop NIC failsb.You diffuse coffee on your laptopc.Your laptop faces a rejection of labor onsetd.You cast a unconfirmed password or divide it delay others

1.00000 summits   

QUESTION 3

  1. Purchasing cyber carelessness to clothe the privation of wealth during a rejection-of-labor onset is an specimen of which of the aftercited destroy address techniques?a.Avoidanceb.Acceptancec.Transferd.Mitigation

1.00000 summits   

QUESTION 4

  1. Disconnecting a Web server from the Internet so it won’t be hacked  is an specimen of which of the aftercited destroy address techniques?a.Acceptanceb.Transferc.Avoidanced.Mitigation

1.00000 summits   

QUESTION 5

  1. Which of the aftercited organizations operates delayin the Department of Homeland Security, serving as a avenueible summit of contiguity for securing cyberspace.a.NCCICb.NISTc.US-CERTd.Mitre’s CVE

1.00000 summits   

QUESTION 6

  1. Which of the aftercited organizations provides direction documents, such as those in their Special Publications (SP) 800 succession?a.NCCICb.NISTc.US-CERTd.Mitre’s CVE

1.00000 summits   

QUESTION 7

  1. Which of the aftercited is NOT an unpremeditated intimidation?a.A Denial-of-Service onset opposite the Web server.b.The janitor trips balance a succession in the computer admission that was unguarded on the pavement and crashes a server.c.A constrained animate in a server fails.d.A tempest floods the computer admission.

1.00000 summits   

QUESTION 8

  1. Which of the aftercited is an specimen of an premeditated intimidation?a.Malware, such as ransomware, infects a computer b.An electrical vitality in the computer admissionc.A program was not written delay carelessness in remembrance, so has multifarious bugsd.Cheap constrained animates were purchased from China having a violent blame of failure

1.00000 summits   

QUESTION 9

  1. An onset in which more facts that what a program was calculated to treat is best forcible as a/an:a.LDAP Injectionb.Buffer Overflowc.DDoS Attackd.SQL Injection

QUESTION 10

  1. Vulnerability/Threat Pairs. Match the aftercited vulnerabilities delay its associated threa

Malware infection----

a.

Server does not enjoy tit RAM/CPU resources

b.

Outdated antivirus

c.

Equipment Failure

d.

Fire

e.

SQL Injection due to poorly-implemented factsbase application

f.

Weak password policy


Potential for rejection-of-labor onset to be successful----

a.

Server does not enjoy tit RAM/CPU resources

b.

Outdated antivirus

c.

Equipment Failure

d.

Fire

e.

SQL Injection due to poorly-implemented factsbase application

f.

Weak password policy


Damage to severs and other IT assets----

a.

Server does not enjoy tit RAM/CPU resources

b.

Outdated antivirus

c.

Equipment Failure

d.

Fire

e.

SQL Injection due to poorly-implemented factsbase application

f.

Weak password policy


Unauthorized avenue ---- 

a.

Server does not enjoy tit RAM/CPU resources

b.

Outdated antivirus

c.

Equipment Failure

d.

Fire

e.

SQL Injection due to poorly-implemented factsbase application

f.

Weak password policy


Unauthorized disclosure of facts in a factsbase ---- 

a.

Server does not enjoy tit RAM/CPU resources

b.

Outdated antivirus

c.

Equipment Failure

d.

Fire

e.

SQL Injection due to poorly-implemented factsbase application

f.

Weak password policy


Resources are determined to users when they scarcity them ----

a.

Server does not enjoy tit RAM/CPU resources

b.

Outdated antivirus

c.

Equipment Failure

d.

Fire

e.

SQL Injection due to poorly-implemented factsbase application

f.

Weak password policy