Filters
Question type

Study Flashcards

List and describe the elements that make up a security posture.

Correct Answer

verifed

verified

Initial baseline configuration. A baseli...

View Answer

Match the following terms to the appropriate definitions. -​Disabling unused application/service ports to reduce the number of threat vectors.


A) asset
B) cyberterrorism
C) hactivist
D) exploit kit
E) computer spy
F) risk
G) threat
H) threat agent
I) vulnerability
J) threat vector

K) A) and H)
L) F) and G)

Correct Answer

verifed

verified

What is the term for a network set up with intentional vulnerabilities?


A) honeynet
B) honeypot
C) honeycomb
D) honey hole

E) All of the above
F) C) and D)

Correct Answer

verifed

verified

List and describe two common uses for a protocol analyzer.

Correct Answer

verifed

verified

Network troubleshooting. Protocol analyz...

View Answer

Which tester has an in-depth knowledge of the network and systems being tested, including network diagrams, IP addresses, and even the source code of custom applications?


A) white box
B) black box
C) replay
D) system

E) B) and D)
F) B) and C)

Correct Answer

verifed

verified

Match the following terms to the appropriate definitions. -An agreement through which parties in a relationship can reach an understanding of their relationships and responsibilities.​


A) asset
B) cyberterrorism
C) hactivist
D) exploit kit
E) computer spy
F) risk
G) threat
H) threat agent
I) vulnerability
J) threat vector

K) C) and F)
L) F) and J)

Correct Answer

verifed

verified

Which scan examines the current security, in a passive method?


A) application scan
B) system scan
C) threat scan
D) vulnerability scan

E) C) and D)
F) A) and B)

Correct Answer

verifed

verified

Match the following terms to the appropriate definitions. -​The termination of an agreement between parties.


A) asset
B) cyberterrorism
C) hactivist
D) exploit kit
E) computer spy
F) risk
G) threat
H) threat agent
I) vulnerability
J) threat vector

K) G) and H)
L) A) and E)

Correct Answer

verifed

verified

Which is the term for a computer typically located in an area with limited security and loaded with software and data files that appear to be authentic, yet they are actually imitations of real data files.


A) port scanner
B) write blocker
C) honeypot
D) honeycomb

E) None of the above
F) All of the above

Correct Answer

verifed

verified

In order to minimize vulnerabilities in software, code should be subject to and analyzed while it is being written in what option below?


A) black box
B) code review
C) white box
D) scanner

E) C) and D)
F) B) and C)

Correct Answer

verifed

verified

Showing 41 - 50 of 50

Related Exams

Show Answer