CMB icon images CHAPTER 2 ASSESSMENT

  1. Which one of the following is not a type of social engineering attack?
    1. Dumpster diving
    2. Shoulder surfing
    3. Trojan horse
    4. Persuasion
  2. Passwords are a part of which of the following processes?
    1. Authentication
    2. Searching
    3. Authorization
    4. Linking
  3. Which of the following is a vulnerability?
    1. Having a security system at work
    2. Leaving a window open in a parked car
    3. Hiring a security guard to work the night shift
    4. Using a long password for the firewall
  4. Which of the following is a threat?
    1. Anything that can be used as a weapon
    2. The likelihood of a robber getting caught
    3. The likelihood that you will get attacked
    4. Anything that can cause damage to assets
  5. The three factors that are considered when analyzing the impact of a security breach are vulnerabilities, threats, and risk. An agent with the potential to cause a security breach is which of the following?
    1. Vulnerability
    2. Threat
    3. Risk
    4. Exploit
  6. A weakness or flaw in the security of an asset that could be exploited is which of the following?
    1. Vulnerability
    2. Threat
    3. Risk
    4. Access
  7. A(n) _________ system has a narrow attack surface that exposes as few attack vectors as possible.
    1. operating
    2. hardened
    3. networked
    4. proxy
  8. Which of the following directs an administrator to assign a user account only the permissions and rights necessary to perform his or her assignment?
    1. Principle of balanced authority
    2. Principle of most privilege
    3. Principle of least privilege
    4. Principle of average authority
  9. Which of the following organizations is a nonprofit foundation with the mission to improve software security by developing or sponsoring open-source software and training and education conferences worldwide?
    1. IEEE
    2. OWASP
    3. Wi-Fi Alliance
    4. OUI
  10. Which three of the following are represented in the CIA Triad?
    1. Investigation
    2. Confidentiality
    3. Integrity
    4. Consolidated
    5. Assets
    6. Availability
    7. Identification
    8. Common
    9. Aggregated
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset