0 of 16 Questions completed
Questions:
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading…
You must sign in or sign up to start the quiz.
You must first complete the following:
0 of 16 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Average score |
|
Your score |
|
An organization is taking steps to protect sensitive information by utilizing anonymization techniques throughout its lifecycle. What particular phase of the information lifecycle does this strategy most directly address?
Which specific form of malware can embed itself within a host file and consequently spread to other files and systems when the host file is run?
A website allows users to post malicious scripts into discussion board. What type of web-based vulnerability is this?
What is the primary purpose of a business impact analysis (BIA)?
Replication involves copying data to a secondary location for redundancy. Which replication method provides the fastest recovery time objective (RTO)?
A critical database server experiences a hardware failure. What would ensure continued service availability?
A company is considering using both encryption and tokenization to secure customer credit card information. Is this approach necessary?
What is the PRIMARY reason for including security considerations during the hardware and software acquisition process?
A security team investigates a distributed denial-of-service (DDoS) attack. Which data source would be MOST helpful in identifying the attack source?
What is the primary purpose of internal compliance reporting?
What are the two primary techniques used in a phishing attack?
Your organization’s website is currently hosted by an ISP. Which specific risk response technique is being employed?
During a forensic analysis, Drew discovered that an attacker intercepted traffic headed to networked printers by modifying the printer drivers. His analysis uncovered that the attacker modified the code of the driver to transmit copies of printed documents to a secure repository. What type of attack took place?
Amanda is worried about LDAP injection attacks against her directory server. What is NOT a common technique to prevent LDAP injection attacks?
Amanda is focused on implementing port-based authentication to secure her network and is seeking an authentication protocol that is specifically for this purpose. Which authentication protocol best suits her needs?
What is the difference between spear phishing and whaling?