Skip to main content

IS5403 Week 1 Quizezz

5
Question

Proxies are "devices" that are strictly software-only.

Correct
 
5 of 8
6
Question

A web application firewall is exactly the same as a network firewall.

Correct
 
6 of 8
7
Question

A Web application firewall protects Web servers from malicious traffic and blocks attempts to compromise the system. It prevents targeted attacks that include Denial of Service (DOS), Cross-Site Scripting (XSS), SQL injection, Cross-Site Request Forgery (CSRF), forceful browsing, cookie poisoning and invalid input. In which of the following attacks does the attacker gains access to a restricted page within a Web application by supplying a URL directly?

Correct
 
7 of 8
8
Question

Anetwork administrator is evaluating different firewalls. Which of the following firewalls provides protection from the following attacks: Denial of Service (DOS), Cross-Site Scripting (XSS), SQL injection, Cross-Site Request Forgery (CSRF), forceful browsing, cookie poisoning and invalid input?

Correct


2
Question

Which of the following risks does the use of social netowrking and P2P platforms pose?

Correct
 
2 of 4
3
Question

Under which of the following does "shoulder surfing" fall?

Correct
 
3 of 4
4
Question

What are the factors that contribute to the effectiveness of social engineering techniques? [Choose all that apply.]

Correct
Which tool is most commonly associated with nation state threat actors?
CORRECT
See Ch. 1: Introduction to Security, Section - Nation State Actors
Which of the following is an enterprise critical asset?
CORRECT
See Ch. 1: Introduction to Security, Section - Information Security Terminology
Which of the following is NOT a successive layer in which information security is achieved?
CORRECT
See Ch. 1: Introduction to Security, Section - Defining Information Security
Ian recently earned his security certification and has been offered a promotion to a position that requires him to analyze and design security solutions as well as identifying users' needs. Which of these generally recognized security positions has Ian been offered?
CORRECT
See Ch. 1: Introduction to Security, Section - Challenges of Securing Information
Which of the following is NOT true regarding security?

CORRECT
See Ch. 1: Introduction to Security, Section - Understanding Security
What is a race condition?
CORRECT
See Ch. 1: Introduction to Security, Section - Reasons for Successful Attacks
What are industry-standard frameworks and reference architectures that are required by external agencies known as?
CORRECT
See Ch. 1: Introduction to Security, Section - Frameworks and Reference Architectures
Gunnar is creating a document that explains risk response techniques. Which of the following would he NOT list and explain in his document?
CORRECT
See Ch. 1: Introduction to Security, Section - Information Security Terminology
An organization that practices purchasing products from different vendors is demonstrating which security principle?
CORRECT
See Ch. 1: Introduction to Security, Section - Fundamental Security Principles
Which act requires banks and financial institutions to alert their customers of their policies in disclosing customer information?
CORRECT
See Ch. 1: Introduction to Security, Section - Understanding the Importance of Information Security
What is the category of threat actors that sell their knowledge of vulnerabilities to other attackers or governments?
CORRECT
See Ch. 1: Introduction to Security, Section - Other Threat Actors
Adone is attempting to explain to his friend the relationship between security and convenience. Which of the following statements would he use?
CORRECT
See Ch. 1: Introduction to Security, Section - Understanding Security
Which the following is NOT a reason why it is difficult to defend against today's attackers?
CORRECT
See Ch. 1: Introduction to Security, Section - Difficulties in Defending Against Attacks
Why do cyberterrorists target power plants, air traffic control centers, and water systems?
CORRECT
See Ch. 1: Introduction to Security, Section - Other Threat Actors
Tatyana is discussing with her supervisor potential reasons why a recent attack was successful against one of their systems. Which of the following configuration issues would NOT be covered?
CORRECT
See Ch. 1: Introduction to Security, Section - Reasons for Successful Attacks
Signe wants to improve the security of the small business where she serves as a security manager. She determines that the business needs to do a better job of not revealing the type of computer, operating system, software, and network connections they use. What security principle does Signe want to use?
CORRECT
See Ch. 1: Introduction to Security, Section - Fundamental Security Principles
Complete this definition of information security: That which protects the integrity, confidentiality, and availability of information _____.
CORRECT
See Ch. 1: Introduction to Security, Section - Defining Information Security
Alyona has been asked by her supervisor to give a presentation regarding reasons why security attacks continue to be successful. She has decided to focus on the issue of widespread vulnerabilities. Which of the following would Alyona NOT include in her presentation?
CORRECT
See Ch. 1: Introduction to Security, Section - Reasons for Successful Attacks
Which of the following ensures that only authorized parties can view protected information?
CORRECT
See Ch. 1: Introduction to Security, Section - Defining Information Security
What is an objective of state-sponsored attackers?
CORRECT
See Ch. 1: Introduction to Security, Section - Nation State Actors


A watering hole attack is directed against which of the following?
CORRECT
See Ch. 2: Malware and Social Engineering Attacks, Section - Psychological Approaches
Which statement regarding a keylogger is NOT true?
CORRECT
See Ch. 2: Malware and Social Engineering Attacks, Section - Payload Capabilities
Which type of mutation completely changes a virus from its original form by rewriting its own code whenever it is executed?
CORRECT
See Ch. 2: Malware and Social Engineering Attacks, Section - Circulation
Which type of malware requires a user to transport it from one computer to another?
CORRECT
See Ch. 2: Malware and Social Engineering Attacks, Section - CirculationWhich type of malware requires a user to transport it from one computer to another?
CORRECT
See Ch. 2: Malware and Social Engineering Attacks, Section - Circulation
What is the name of the threat actor's computer that gives instructions to an infected computer?
CORRECT
See Ch. 2: Malware and Social Engineering Attacks, Section - Infection
Each of these is a reason why adware is scorned EXCEPT _____.
CORRECT
See Ch. 2: Malware and Social Engineering Attacks, Section - Payload Capabilities


Linnea's father called her to say that a message suddenly appeared on his screen that says his software license has expired and he must immediately pay $500 to have it renewed before control of the computer will be returned to him. What type of malware is this?
CORRECT
See Ch. 2: Malware and Social Engineering Attacks, Section - Infection
Which of these items retrieved through dumpster diving would NOT provide useful information?
CORRECT
See Ch. 2: Malware and Social Engineering Attacks, Section - Physical Procedures
Which of the following is NOT a primary trait of malware?
CORRECT
See Ch. 2: Malware and Social Engineering Attacks, Section - Attacks Using Malware
Which variation of a phishing attack sends phishing messages only to wealthy individuals?
CORRECT
See Ch. 2: Malware and Social Engineering Attacks, Section - Psychological Approaches
Which of these could NOT be defined as a logic bomb?

CORRECT
See Ch. 2: Malware and Social Engineering Attacks, Section - Payload Capabilities
What is the term used for a threat actor who controls multiple bots in a botnet?
CORRECT
See Ch. 2: Malware and Social Engineering Attacks, Section - Payload Capabilities
Lykke receives a call while working at the helpdesk from someone who needs his account reset immediately. When Lykke questions the caller, he says, "If you don't reset my account immediately, I will call your supervisor!" What psychological approach is the caller attempting to use on Lykke?
CORRECT
See Ch. 2: Malware and Social Engineering Attacks, Section - Psychological Approaches
Which of these is a general term used for describing software that gathers information without the user's consent?
CORRECT
See Ch. 2: Malware and Social Engineering Attacks, Section - Payload Capabilities
Which of the following is NOT correct about a rootkit?

CORRECT
See Ch. 2: Malware and Social Engineering Attacks, Section - Concealment
Astrid's computer screen suddenly says that all files are now locked until money is transferred to a specific account, at which time she will receive a means to unlock the files. What type of malware has infected her computer?
CORRECT
See Ch. 2: Malware and Social Engineering Attacks, Section - Infection
How can an attacker use a hoax?
CORRECT
See Ch. 2: Malware and Social Engineering Attacks, Section - Psychological Approaches
Hedda pretends to be the help desk manager and calls Steve to trick him into giving her his password. What social engineering attack has Hedda performed?
CORRECT
See Ch. 2: Malware and Social Engineering Attacks, Section - Psychological Approaches
Ebba received a message from one of her tech support employees. In violation of company policy, a user had downloaded a free program to receive weather reports, but the program had also installed malware on the computer that gave the threat actor unrestricted access to the computer. What type of malware had been downloaded?
CORRECT
See Ch. 2: Malware and Social Engineering Attacks, Section - Infection
Which of the following is defined as following an authorized person through a secure door?
CORRECT
See Ch. 2: Malware and Social Engineering Attacks, Section - Physical Procedures






























































































Comments

Popular posts from this blog

IS5203 Type 2 Post Assessment and Final Quiz

  Carlos has just created a new subnet for the finance department. He needs to be able to allow the employees in finance to retrieve files from the sales server, which is located in another subnet. Which of the following OSI model layers would it be necessary to categorize the device into? a. Layer 4 b. Layer 6 c. Layer 2 d. Layer 3 All of the cubicles in a company's office have cables that run up to the ceiling and across to an IDF. Inside the IDF, they connect directly to the latest generation switch available from the networking equipment vendor that they have chosen. Which of the following describes the physical topology most likely in use? a. mesh

GE5103-2 Project Management [Aug 23 Syllabus]

    Some of the advantages of using time boxes and cycles in project coordination efforts include creating urgency, measuring progress, and allowing for predictable measurements. A)        True 2.    Even though most project managers are not contract specialists, they need to understand the process well enough to coordinate with the team. For the current assignment, you are looking at a short-term and small effort with a contractor of just a few hours without significant clarity. Which of the following would be the most applicable contract to use in this situation? A)        Time and materials 3. The project you are working on has had modifications to the plan from the start and even how the project is run. Project governance covers all of the 3 following except: A)        Naming The project manager 4. Of the following, which is most likely a trigger condition defined early in the project? A) Alerting Governance board if 10 percent over schedule 5. Of the following options, which stand

GE5163 Week8 ( Final Exam ) Quize's

  A process or product that is insensitive to normal variation is referred to as being Select one: a. in specification b. capable c. robust d. out of control Feedback Your answer is correct. A completed failure mode and effects analysis (FMEA) results in the following assessment rating.      Occurrence = 4      Severity = 8      Detection = 10 What is the risk priority number (RPN) for this FMEA? Select one: a. 42 b. 22 c. 320 d. 120 Feedback Your answer is correct. In a visual inspection situation, one of the best ways to minimize deterioration of the quality level is to: Select one: a. have a program of frequent eye exams. b. retrain the inspector frequently. c. add variety to the task. d. have a standard to compare against as an element of the operation. Feedback Your answer is correct. Which of the following elements is least necessary to a good corrective action feedback report? Select one: a. What caused the failure b. Who caused the failure c. What correction has been made d. Wh