Quiz

  1. The potential for a negative event to occur is a vulnerability.  True
    False

1.00000 points   

QUESTION 2

  1. Which of the following is an example of a user domain vulnerability? a.Your laptop NIC failsb.You spill coffee on your laptopc.Your laptop faces a denial of service attackd.You configure a weak password or share it with others

1.00000 points   

QUESTION 3

  1. Purchasing cyber insurance to cover the loss of revenue during a denial-of-service attack is an example of which of the following risk management techniques?a.Avoidanceb.Acceptancec.Transferd.Mitigation

1.00000 points   

QUESTION 4

  1. Disconnecting a Web server from the Internet so it won’t be hacked  is an example of which of the following risk management techniques?a.Acceptanceb.Transferc.Avoidanced.Mitigation

1.00000 points   

QUESTION 5

  1. Which of the following organizations operates within the Department of Homeland Security, serving as a central point of contact for securing cyberspace.a.NCCICb.NISTc.US-CERTd.Mitre’s CVE

1.00000 points   

QUESTION 6

  1. Which of the following organizations provides guidance documents, such as those in their Special Publications (SP) 800 series?a.NCCICb.NISTc.US-CERTd.Mitre’s CVE

1.00000 points   

QUESTION 7

  1. Which of the following is NOT an unintentional threat?a.A Denial-of-Service attack against the Web server.b.The janitor trips over a cord in the computer room that was exposed on the floor and crashes a server.c.A hard drive in a server fails.d.A hurricane floods the computer room.

1.00000 points   

QUESTION 8

  1. Which of the following is an example of an intentional threat?a.Malware, such as ransomware, infects a computer b.An electrical fire in the computer roomc.A program was not written with security in mind, so has many bugsd.Cheap hard drives were purchased from China having a high rate of failure

1.00000 points   

QUESTION 9

  1. An attack in which more data that what a program was designed to handle is best described as a/an:a.LDAP Injectionb.Buffer Overflowc.DDoS Attackd.SQL Injection

QUESTION 10

  1. Vulnerability/Threat Pairs. Match the following vulnerabilities with its associated threa

Malware infection—-

a.

Server does not have sufficient RAM/CPU resources

b.

Outdated antivirus

c.

Equipment Failure

d.

Fire

e.

SQL Injection due to poorly-implemented database application

f.

Weak password policy

Potential for denial-of-service attack to be successful—-

a.

Server does not have sufficient RAM/CPU resources

b.

Outdated antivirus

c.

Equipment Failure

d.

Fire

e.

SQL Injection due to poorly-implemented database application

f.

Weak password policy

Damage to severs and other IT assets—-

a.

Server does not have sufficient RAM/CPU resources

b.

Outdated antivirus

c.

Equipment Failure

d.

Fire

e.

SQL Injection due to poorly-implemented database application

f.

Weak password policy

Unauthorized access —- 

a.

Server does not have sufficient RAM/CPU resources

b.

Outdated antivirus

c.

Equipment Failure

d.

Fire

e.

SQL Injection due to poorly-implemented database application

f.

Weak password policy

Unauthorized disclosure of data in a database —- 

a.

Server does not have sufficient RAM/CPU resources

b.

Outdated antivirus

c.

Equipment Failure

d.

Fire

e.

SQL Injection due to poorly-implemented database application

f.

Weak password policy

Resources are unavailable to users when they need them —-

a.

Server does not have sufficient RAM/CPU resources

b.

Outdated antivirus

c.

Equipment Failure

d.

Fire

e.

SQL Injection due to poorly-implemented database application

f.

Weak password policy

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now