1/25
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Which type of attack has the PRIMARY objective controlling the system from outside?
Backdoor
Which of the following is not a protocol of the OSI Level 3?
SNMP
When a company hires an insurance company to mitigate risk, which risk management technique is being applied?
Risk transfer
The SMTP protocol operates at OSI Level:
7
The process of verifying or proving the user's identification is known as:
Authentication
If an organization wants to protect itself against tailgating, which of the following types of access control would be most effective?
Turnstiles
Logging and monitoring systems are essential to:
Identifying inefficient performing systems, detecting compromises, and providing a record of how systems are used
In the event of a disaster, which of these should be the PRIMARY objective?
Guarantee the safety of people
The process that ensures that system changes do not adversely impact business operations is known as:
Change Management
The last phase in the data security cycle is:
Destruction
Which access control model specifies access to an object based on the subject's role in the organization?
RBAC
Which of the following is NOT an example of a physical security control?
Firewalls
Which type of attack will most effectively maintain remote access and control over the victim's computer?
Rootkits
In incident terminology, the meaning of Zero Day is:
A previously unknown system vulnerability
Which of the following is NOT a possible model for an Incident Response Team (IRT)?
Pre-existing
A device found not to comply with the security baseline should be:
Disabled or isolated into a quarantine area until it can be checked and updated.
A biometric reader that grants access to a computer system in a data center is a:
Technical Control
Which type of attack PRIMARILY aims to make a resource inaccessible to its intended users?
Denials of Service
Which type of attack embeds malicious payload inside a reputable or trusted software?
Trojans
Which tool is commonly used to sniff network traffic?
Wireshark
Which of these is not an attack against an IP network?
Side-channel Attack
The detailed steps to complete tasks supporting departmental or organizational policies are typically documented in:
Procedures
Which device is used to connect a LAN to the Internet?
Router
What does SIEM mean?
Security Information and Event Manager
A Security safeguard is the same as a:
Security control
Which access control model can grant access to a given object based on complex rules?
ABAC