Question
QUESTION 3 Members of hacker groups LulzSec and Anonymous used this type of attack to steal millions of user' account information from Sony Corporation in
QUESTION 3
-
Members of hacker groups LulzSec and Anonymous used this type of attack to steal millions of user' account information from Sony Corporation in 2011:
a. SQL Injection Attack
b. Social Engineering Attack
c. Brute Force Attack
d. Spear Phishing Attack
QUESTION 4
-
A Trojan Horse is a program that hides itself by deleting a system file and taking on the system file's name.
True
False
QUESTION 5
-
After a Hacker has selects her target, performed reconnaissance on the potential target's network, and probed active Internet Addresses and hosts, what does she scan next on the target's network to see if any are open?
DMZ
MAC Addresses
DNS Servers
System Ports
QUESTION 6
-
SYN flood and HTTP floods are types of SQL injection attacks.
True
False
QUESTION 7
-
Under the U.S. Gramm-Leach-Bliley Act, companies must report whether they have any material control deficiencies in their financial reporting process.
True
False
QUESTION 8
-
This 2002 Act was enacted to bolster computer and network security within the federal government and affiliated parties by mandating yearly audits:
Sarbanes-Oxley Act
HIPAA
European Union Data Protection Directive
Federal Information Security Management Act
1 points
QUESTION 9
-
In a company, what does "CSO" stand for?
QUESTION 10
-
In classic risk analysis calculations, "Exposure Factor" is the amount of damage that would be sustained in a single breach.
True
False
QUESTION 11
-
When responding to risk, buying insurance for your company is a type of Risk Avoidance.
True
False
QUESTION 12
-
What is the difference between "Data" and "Information"?
For the toolbar, press ALT+F10 (PC) or ALT+FN+F10 (Mac). P
0 WORDSPOWERED BY TINY
QUESTION 13
-
A "threat agent" is a specific instance of a potential threat being realized.
True
False
QUESTION 14
-
A "zero-day attack" exploit some previously unknown vulnerability in a system.
True
False
QUESTION 15
-
What does "PII" stand for?
QUESTION 16
-
In modern networking, the most common protocol suite is:
Address Resolution Protocol
Hyper Text Transfer Protocol
Domain Name Protocol
Transmission Control Protocol/Internet Protocol
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started