10.2 Flashcards

1
Q

I am altering Janice records on a deer a server at attacker can redirect in that traffic for legitimate Web server to a fishing website which is called – – – – – – or – – – – – –

A

DNS poisoning or DNS spoofing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the following certain characteristics of malware that can make it hard to detect

A

Encryption
Stealth
Polymorphism
Time dependence

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

This evaluate threats to and vulnerabilities of the net work

A

Security risk assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

This evaluates the impact of potential threats or business processor

A

Business risk assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

This is a series of steps that accomplishes define goal

A

A business process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

From the IT perspective than a blank blank blank blank blank ensures that you and other responsible for network security understand your company’s business processes which will help you minimize the impact of security threats all those processes

A

Process assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

This evaluate security in compliance related to suppliers in vendors and company does business with

A

Vendor risk assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

This is a thorough examination of each aspect of the networks to determine how it might be compromised

A

Posture assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This identify specific security threats to the net work and related risk factors

A

Threat assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

This is used to identify vulnerabilities Internet work so often performed by companies on employees and does not attempt to exploit any vulnerabilities

A

Vulnerability assessment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

This team attempts to conduct the attack

A

Red team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

——— team attempt to defend the net work

A

Blue

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This team consist of a hired hacker such as a consultant or security organization

A

Red team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Team consist of the companies on IT security another staff

A

Blue team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

This team is in charge of offensive security vulnerability assessment social engineering penetration testing

A

Red team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly