Module 5 Unit 1 Flashcards

1
Q

which property of secure information is compromising by snooping

A

Confidentiality

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Module 5 Unit 3 an attacker has used a rogue access point to intercept traffic passing between wireless clients and the wire network segment. What type of attack is this?

A

Man in the middle attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

what type of access mechanism is most vulnerable to every play attack?

A

use of a token generated by software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

which specific attack uses a botnet threaten availability ?

A

Distributed denial of service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

And considering availability concerns what might lockable face plate on a server class computer be

A

it may prevent the user switching the machine on or off, or accessing removable drives and port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what does AAA stand for?

A

Authentication authorization accounting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

why should a security policy instruct users not to reveal their password to technical support staff?

A

It exposes users to social engineering attacks, gather login credentials from malicious users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

how might someone masquerade as someone else while using email or instant messaging

A

by accessing their user account.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What are three main areas where redundancy should be provisioned?

A

Data and storage, network, links, and power

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Why is it prioritization a critical task for disaster recovery?

A

services may have dependencies that make restoring them in the wrong order futile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly