Quiz
The abeyant for a abrogating accident to action is a vulnerability. True
False
1.00000 credibility
QUESTION 2
Which of the afterward is an archetype of a user area vulnerability? a.Your laptop NIC failsb.You discharge coffee on your laptopc.Your laptop faces a abnegation of account attackd.You configure a anemic countersign or allotment it with others
1.00000 credibility
QUESTION 3
Purchasing cyber allowance to awning the accident of acquirement during a denial-of-service advance is an archetype of which of the afterward accident administration techniques?a.Avoidanceb.Acceptancec.Transferd.Mitigation
1.00000 credibility
QUESTION 4
Disconnecting a Web server from the Internet so it won’t be hacked is an archetype of which of the afterward accident administration techniques?a.Acceptanceb.Transferc.Avoidanced.Mitigation
1.00000 credibility
QUESTION 5
Which of the afterward organizations operates aural the Department of Homeland Security, confined as a axial point of acquaintance for accepting cyberspace.a.NCCICb.NISTc.US-CERTd.Mitre’s CVE
1.00000 credibility
QUESTION 6
Which of the afterward organizations provides advice documents, such as those in their Special Publications (SP) 800 series?a.NCCICb.NISTc.US-CERTd.Mitre’s CVE
1.00000 credibility
QUESTION 7
Which of the afterward is NOT an accidental threat?a.A Denial-of-Service advance adjoin the Web server.b.The attendant trips over a bond in the computer allowance that was apparent on the attic and crashes a server.c.A adamantine drive in a server fails.d.A blow floods the computer room.
1.00000 credibility
QUESTION 8
Which of the afterward is an archetype of an advised threat?a.Malware, such as ransomware, infects a computer b.An electrical blaze in the computer roomc.A affairs was not accounting with aegis in mind, so has abounding bugsd.Cheap adamantine drives were purchased from China accepting a aerial amount of failure
1.00000 credibility
QUESTION 9
An advance in which added abstracts that what a affairs was advised to handle is best declared as a/an:a.LDAP Injectionb.Buffer Overflowc.DDoS Attackd.SQL Injection
QUESTION 10
Vulnerability/Threat Pairs. Match the afterward vulnerabilities with its associated threa
Malware infection----
a.
Server does not accept acceptable RAM/CPU resources
b.
Outdated antivirus
c.
Equipment Failure
d.
Fire
e.
SQL Injection due to poorly-implemented database application
f.
Weak countersign policy
Potential for denial-of-service advance to be successful----
a.
Server does not accept acceptable RAM/CPU resources
b.
Outdated antivirus
c.
Equipment Failure
d.
Fire
e.
SQL Injection due to poorly-implemented database application
f.
Weak countersign policy
Damage to severs and alternative IT assets----
a.
Server does not accept acceptable RAM/CPU resources
b.
Outdated antivirus
c.
Equipment Failure
d.
Fire
e.
SQL Injection due to poorly-implemented database application
f.
Weak countersign policy
Unauthorized admission ----
a.
Server does not accept acceptable RAM/CPU resources
b.
Outdated antivirus
c.
Equipment Failure
d.
Fire
e.
SQL Injection due to poorly-implemented database application
f.
Weak countersign policy
Unauthorized acknowledgment of abstracts in a database ----
a.
Server does not accept acceptable RAM/CPU resources
b.
Outdated antivirus
c.
Equipment Failure
d.
Fire
e.
SQL Injection due to poorly-implemented database application
f.
Weak countersign policy
Resources are bare to users back they charge them ----
a.
Server does not accept acceptable RAM/CPU resources
b.
Outdated antivirus
c.
Equipment Failure
d.
Fire
e.
SQL Injection due to poorly-implemented database application
f.
Weak countersign policy
Order a unique copy of this paper