Module 5 Unit 1 Flashcards
which property of secure information is compromising by snooping
Confidentiality
Module 5 Unit 3 an attacker has used a rogue access point to intercept traffic passing between wireless clients and the wire network segment. What type of attack is this?
Man in the middle attack
what type of access mechanism is most vulnerable to every play attack?
use of a token generated by software.
which specific attack uses a botnet threaten availability ?
Distributed denial of service
And considering availability concerns what might lockable face plate on a server class computer be
it may prevent the user switching the machine on or off, or accessing removable drives and port
what does AAA stand for?
Authentication authorization accounting
why should a security policy instruct users not to reveal their password to technical support staff?
It exposes users to social engineering attacks, gather login credentials from malicious users
how might someone masquerade as someone else while using email or instant messaging
by accessing their user account.
What are three main areas where redundancy should be provisioned?
Data and storage, network, links, and power
Why is it prioritization a critical task for disaster recovery?
services may have dependencies that make restoring them in the wrong order futile