One defense against denial-of-service attacks is to _______ ICMP packets. - Answer
Block
_________ attacks are becoming less common in modern operating systems. - Answer
Buffer overflow
Blocking ICMP packets may help prevent denial-of-service attacks. - Answer True
Auditing is the process to determine if a user's credentials are authorized to access a
network resource. - Answer False
Confidentiality, integrity, and availability are three pillars of the CIA triangle. - Answer
True
Which of these is a repository of security-related documentation and also sponsors a
number of security research projects? - Answer SANS Institute
A teardrop attack involves sending a forged packet to the victim. - Answer False
Which of these was the first computer incident-response team? - Answer Computer
Emergency Response Team
One classic denial-of-service attack distributed by email was _____________. - Answer
myDoom
Which of these is the process to determine if the credentials given by a user or another
system are authorized to access the network resource in question? - Answer
Authentication
A(n) ______ is a basic security device that filters traffic and is a barrier between a
network and the outside world or between a system and other systems. - Answer
Firewall
Your company is instituting a new security awareness program. You are responsible for
educating end users on a variety of threats, including social engineering. Which of the
following best defines social engineering? - Answer Using people skills to obtain
proprietary information
#Your company is instituting a new security awareness program. You are responsible
for educating end users on a variety of threats, including social engineering. Which of
the following best defines social engineering? - Answer Using people skills to obtain
proprietary information
The __________ is the difference between an organization's observed and desired
performance. - Answer performance gap