The potential for a negative event to occur is a vulnerability. True
False
1.00000 points
QUESTION 2
Which of the following is an example of a user domain vulnerability? a.Your laptop NIC failsb.You spill coffee on your laptopc.Your laptop faces a denial of service attackd.You configure a weak password or share it with others
1.00000 points
QUESTION 3
Purchasing cyber insurance to cover the loss of revenue during a denial-of-service attack is an example of which of the following risk management techniques?a.Avoidanceb.Acceptancec.Transferd.Mitigation
1.00000 points
QUESTION 4
Disconnecting a Web server from the Internet so it won’t be hacked is an example of which of the following risk management techniques?a.Acceptanceb.Transferc.Avoidanced.Mitigation
1.00000 points
QUESTION 5
Which of the following organizations operates within the Department of Homeland Security, serving as a central point of contact for securing cyberspace.a.NCCICb.NISTc.US-CERTd.Mitre’s CVE
1.00000 points
QUESTION 6
Which of the following organizations provides guidance documents, such as those in their Special Publications (SP) 800 series?a.NCCICb.NISTc.US-CERTd.Mitre’s CVE
1.00000 points
QUESTION 7
Which of the following is NOT an unintentional threat?a.A Denial-of-Service attack against the Web server.b.The janitor trips over a cord in the computer room that was exposed on the floor and crashes a server.c.A hard drive in a server fails.d.A hurricane floods the computer room.
1.00000 points
QUESTION 8
Which of the following is an example of an intentional threat?a.Malware, such as ransomware, infects a computer b.An electrical fire in the computer roomc.A program was not written with security in mind, so has many bugsd.Cheap hard drives were purchased from China having a high rate of failure
1.00000 points
QUESTION 9
An attack in which more data that what a program was designed to handle is best described as a/an:a.LDAP Injectionb.Buffer Overflowc.DDoS Attackd.SQL Injection
QUESTION 10
Vulnerability/Threat Pairs. Match the following vulnerabilities with its associated threa
Malware infection—-
a.
Server does not have sufficient RAM/CPU resources
b.
Outdated antivirus
c.
Equipment Failure
d.
Fire
e.
SQL Injection due to poorly-implemented database application
f.
Weak password policy
Potential for denial-of-service attack to be successful—-
a.
Server does not have sufficient RAM/CPU resources
b.
Outdated antivirus
c.
Equipment Failure
d.
Fire
e.
SQL Injection due to poorly-implemented database application
f.
Weak password policy
Damage to severs and other IT assets—-
a.
Server does not have sufficient RAM/CPU resources
b.
Outdated antivirus
c.
Equipment Failure
d.
Fire
e.
SQL Injection due to poorly-implemented database application
f.
Weak password policy
Unauthorized access —-
a.
Server does not have sufficient RAM/CPU resources
b.
Outdated antivirus
c.
Equipment Failure
d.
Fire
e.
SQL Injection due to poorly-implemented database application
f.
Weak password policy
Unauthorized disclosure of data in a database —-
a.
Server does not have sufficient RAM/CPU resources
b.
Outdated antivirus
c.
Equipment Failure
d.
Fire
e.
SQL Injection due to poorly-implemented database application
f.
Weak password policy
Resources are unavailable to users when they need them —-
a.
Server does not have sufficient RAM/CPU resources
b.
Outdated antivirus
c.
Equipment Failure
d.
Fire
e.
SQL Injection due to poorly-implemented database application
f.
Weak password policy