Question
Some default installations of the MS-SQL server did not have a password on the 'SA' system account. This allowed anyone with network access to the
Some default installations of the MS-SQL server did not have a password on the 'SA' system account. This allowed anyone with network access to the system to run random commands. When using this ______, the worm configures the 'Guest' account to allow file sharing and uploads itself to the target. It then uses the same MS-SQL password-less 'SA' account access to launch a remote copy of itself, thus spreading the infection.
a. Threat
b. Attack
c. Exploit
d. Vulnerability
2. Information only has value if it is correct. Information that has been tampered with could prove costly. For example, if you were sending an online money transfer for $100, but the information was tampered in such a way that you sent $10,000, it could prove to be very costly for you. This is an example of ______. Information only has value if the right people can access it at the right times. Denying access to information has become a very common attack nowadays. Almost every week, you can find news about high-profile websites being taken down by DDoS attacks. The primary aim of DDoS attacks is to deny users of the website access to the resources of the website. Such downtime can be very costly. This is an example of ______. Information has value, especially in today's world. Bank account statements, personal information, credit card numbers, trade secrets, and government documents. Everyone has information they wish to keep a secret. Protecting such information is a very major part of information security. This is an example of ______.
a. Integrity, availability, Confidentiality
b. Integrity, Confidentiality, availability
c. Confidentiality, availability, integrity
d. Confidentiality, integrity, availability
3. During the Arab uprisings, a group of computer technicians has orchestrated a series of illegal "denial of service" attacks against the websites of the governments of Egypt and Tunisia in order to help the people. This is an example of__________
a. Hacktivism
b. Hacking
c. Cybercrime
d. Insider threat
4. A cybersecurity specialist is investigating a malware infection on the company's network. After looking through firewall logs, he finds out that Mr. Bake, the company's salesman, downloaded a malware while trying to illegally stream movies from the internet. The firewall logs provide _____________, which ensures Mr. Bake cannot deny his actions that led to the company's malware infection.
a. Non-repudiation
b. Availability
c. Integrity
d. Confidentiality
5. ________ threat actors do not have high technical knowledge and uses script and code that he finds to make an attack against your company. His motivation is that he wants to be seen as a famous hacker._______ threat actors are fairly highly sophisticated but have relatively low persistence. They Traditionally focused on credit card breaches but now ransomware is becoming their preferred method. ______ threat actors are easily the best-funded and most sophisticated of all threat actors. They often use advanced persistent threats (APTs), which is when a threat actor gets long-term control of a compromised system, continually looking for new data to steal.
a. Commodity threat, Organized crime, State-sponsored
b. Hacktivist, Organized crime, Commodity threat
c. Hacktivist, State-sponsored, Organized crime
d. Organized crime, Hacktivist, State-sponsored
6. Not changing the default password on a router is a ______; someone possibly taking control of your router by using the default password is the ______.
a. Attack, Vulnerability
b. Exploit, Vulnerability
c. Vulnerability, Threat
d. Vulnerability, Attack
Step by Step Solution
There are 3 Steps involved in it
Step: 1
The detailed answer for the above question is provided below 1 The correct option is c Exploit The s...Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started