Network Risk Management

This question bank verified by Studydeets
All Questions
Filter by:
Question 1
Free
True/False

 Different types of organizations have similar levels of network security risks.

Choose correct answer/s

True

False

Check answer
Question 2
Free
True/False

 The term malware is derived from a combination of the words malicious and software.

Choose correct answer/s

True

False

Check answer
Question 3
Free
True/False

 A hacker, in the original sense of the word, is someone with technical skill and malicious intent.

Choose correct answer/s

True

False

Check answer
Question 4
Free
True/False

 The day after Patch Tuesday is informally dubbed Exploit Wednesday.

Choose correct answer/s

True

False

Check answer
Question 5
Free
True/False

 A drop ceiling could be used by an intruder to gain access to a secured room.

Choose correct answer/s

True

False

Check answer
Question 6
True/False

 Over a long-distance connection, using SSH keys is more secure than using passwords.

Choose correct answer/s
True
False
To unlock the question
Question 7
True/False

 The original version of the Secure Hash Algorithm was developed by MIT.

Choose correct answer/s
True
False
To unlock the question
Question 8
True/False

 Sudden unexplained increases in file sizes and unusual error messages with no apparent cause are both potential symptoms of a viral infection.

Choose correct answer/s
True
False
To unlock the question
Question 9
True/False

 Current research indicates that a long, random string of words, such as correct horse battery staple is more secure than a random series of letters, numbers, and symbols that is short enough to be remembered.

Choose correct answer/s
True
False
To unlock the question
Question 10
True/False

 It is ideal to use the same password for multiple different applications, provided the password is complex enough.

Choose correct answer/s
True
False
To unlock the question
Question 11
Multiple Choice

 What penetration testing tool combines known scanning and exploit techniques to explore potentially new attack routes?

Choose correct answer/s
A
Nessus
B
metasploit
C
nmap
D
Sub7
To unlock the question
Question 12
Multiple Choice

 Which of the following statements correctly describes the malware characteristic of polymorphism?

Choose correct answer/s
A
Polymorphic malware can change its characteristics every time it is transferred to a new system.
B
Polymorphic malware is designed to activate on a particular date, remaining harmless until that time.
C
Polymorphic malware is software that disguises itself as a legitimate program, or replaces a legitimate program's code with destructive code.
D
Polymorphic malware utilizes encryption to prevent detection.
To unlock the question
Question 13
Multiple Choice

 A virus that remains dormant until a specific condition is met, such as the changing of a file or a match of the current date is known as what type of malware?

Choose correct answer/s
A
encrypted virus
B
logic bomb
C
boot sector virus
D
worm
To unlock the question
Question 14
Multiple Choice

 Which of the following statements describes a worm?

Choose correct answer/s
A
A program that disguises itself as something useful but actually harms your system.
B
A process that runs automatically, without requiring a person to start or stop it.
C
A program that runs independently of other software and travels between computers and across networks.
D
A program that locks a user's data or computer system until a ransom is paid.
To unlock the question
Question 15
Multiple Choice

 If multiple honeypots are connected to form a larger network, what term is used to describe the network?

Choose correct answer/s
A
combolure
B
lurenet
C
honeycomb
D
honeynet
To unlock the question
Question 16
Multiple Choice

 An attack that relies on redirected and captured secure transmissions as they occur is known as what type of attack?

Choose correct answer/s
A
buffer overflow
B
session hijacking attack
C
man-in-the-middle attack
D
banner-grabbing attack
To unlock the question
Question 17
Multiple Choice

 Which of the following scenarios represents a phishing attempt?

Choose correct answer/s
A
An employee at your company has received a malware-infected file in their e-mail.
B
A person posing as an employee tried to access a secured area at your organization.
C
A gift was offered to an employee with access to secured information in exchange for details.
D
An e-mail was sent to a manager at your company that appeared to be from the company's CTO, asking for access.
To unlock the question
Question 18
Multiple Choice

 In a red team-blue team exercise, what is the purpose of the blue team?

Choose correct answer/s
A
The blue team is tasked with attacking the network.
B
The blue team must observe the actions of the red team.
C
The blue team is charged with the defense of the network.
D
The blue team consists of regulators that ensure no illegal activity is undertaken.
To unlock the question
Question 19
Multiple Choice

 Which of the following utilities performs sophisticated vulnerability scans, and can identify unencrypted data such as credit card numbers?

Choose correct answer/s
A
Nmap
B
Nessus
C
Metasploit
D
L0phtcrack
To unlock the question
Question 20
Multiple Choice

 If someone is offered a free gift or service in exchange for private information or access to a computer system, what type of social engineering is taking place?

Choose correct answer/s
A
phishing
B
baiting
C
quid pro quo
D
tailgating
To unlock the question