Understanding Security Threats >> IT Security: Defense against the digital dark arts
Question 1
Phishing, baiting, and tailgating are examples of ________ attacks.
Question 2
An attacker could redirect your browser to a fake website login page using what kind of attack?
Question 3
A(n) _____ attack is meant to prevent legitimate traffic from reaching a service.
Question 4
The best defense against password attacks is using strong _______.
Question 5
Which of these is an example of the confidentiality principle that can help keep your data hidden from unwanted eyes?
Question 6
What could potentially decrease the availability of security and also test the preparedness of data loss?
Question 7
Which of these is true of blackhat and whitehat hackers?
Question 8
If a hacker can steal your passwords by installing malware that captures all the messages you type, what kind of malware did the hacker install? Check all that apply.
Question 9
An unhappy Systems Administrator wrote a malware program to bring down the company’s services after a certain event occurred. What type of malware does this describe?
Question 10
What can occur during a ping of death (POD) attack? Check all that apply.
Question 11
How can injection attacks be prevented? Check all that apply.
Question 12
How can you increase the strength of your passwords? Check all that apply.
Question 13
An end-user received an email stating his bank account was compromised, and that he needs to click a link to reset his password. When the user visited the site, he recognized it as legitimate and entered his credentials which were captured by a hacker. What type of social engineering attack does this describe?
Related Questions & Answers:
- AAA Security (Not Roadside Assistance) AAA Security (Not Roadside Assistance) >> IT Security: Defense against the digital dark arts Question 1 Authentication is concerned with ... Read more...
- Defense in Depth Defense in Depth >> IT Security: Defense against the digital dark arts Question 1 How are attack vectors and attack ... Read more...
- Creating a Company Culture for Security Creating a Company Culture for Security >> IT Security: Defense against the digital dark arts Question 1 What characteristics are ... Read more...
- Creating a Company Culture for Security – Design Document Creating a Company Culture for Security – Design Document >> IT Security: Defense against the digital dark arts 1. Question ... Read more...
- Networking >> Technical Support Fundamentals Networking >> Technical Support Fundamentals Which of the following devices are used in networking? Check all that apply. Switches Hubs ... Read more...
- A brief overview of types of actors and their motives A brief overview of types of actors and their motives >> Introduction to Cybersecurity Tools & Cyber Attacks *Please Do ... Read more...