TEST 2
![]() |
![]() |
![]() |
Título del Test:![]() TEST 2 Descripción: TEST2 SEGURIDAD |




Comentarios |
---|
NO HAY REGISTROS |
Which type of attack involves capturing data packets from a network and transmitting them later to produce an unauthorized effect?. Replay. SQL injection. Man in the middle. Smurf. SYN flood. A(an) is any weakness that makes it possible for a threat to cause harm to a computer or network. Which of the following terms best describes a person with very little hacking skills?. Hacker. Script kiddie. Cracker. Wannabe. All of the above. The main goal of a hacker is to steal or compromise IT assets and potentially steal data: True. False. Which of the following security countermeasures is best for end-point protection against malware?. Antivirus/anti-malware protection. Data leakage prevention. Standardized workstation and laptop images. Security awareness training. All of the above. A SYN flood attack floods a target with invalid or half-open TCP connection requests. True. False. A is a software tool that is used to capture packets from a. War driving involves looking for open or public wireless networks. True. False. Which of the following best describes intellectual property?. The items a business has copyrighted. All patents owned by a business. The unique knowledge a business possesses. Customer lists. All of the above. Which type of malware is a self-contained program that replicates and sends copies of itself to other computers, generally across a network?. Virus. Rootkit. Trojan. Cookie manipulation. Worm. Which type of attacks result in legitimate users not having access to a system resource?. Phishing emails. SQL injection. DDoS. Social engineering. Man in the middle. Which type of malware involves extorting the user or organization into paying money to release a decryption key?. Cryptolocker malware. Virus. Your worst nightmare virus. Logic bomb. Trojan. Which of the following impacts availability?. Cross-site scripting. SQL injection. DDoS. Packet sniffing. None of the above. Which of the following is an example of social engineering?. SQL injection. XML injection. Security design. Impersonation. All of the above. A(an) is any action that could damage an asset. |