m m m m m m m m m m m
entals 7th Edition Ciampa m m m
Name: Class: Date:
Modm01:mIntroductionmto mSecurity
1. Whichmtypemof mthreat mactormwould mbenefit mthemmost mfrommaccessingmyourmenterprise'smnew mmachinemlearni
ngmalgorithmmresearchmand mdevelopment mprogram?
a. Shadow mIT
b. Brokers
c. Criminalmsyndicates
d. Competitors
ANSWER: d
FEEDBACK:
a.mIncorrect. mShadowmITmarememployees mof mthementerprisemf rustrated mwit
hmthempacemof macquiring mnewmtechnology.
b. Incorrect. mBrokers msellmtheirmknowledgemofmamsecurity mweakness mto mot
hermattackers mormgovernments.
c. Incorrect. mCriminalmsyndicates maremthreatmactors mwho minvolvemexperienc
ed monlinemcriminals mwho mdo mnot mcommit mcrimes mthemselves mbut macts ma
s mentrepreneurs.
d. Correct. mCompetitors maremthreatmactors mwho mlaunchmattacks magainst manm
opponent's msystemmto mstealmclassified minformationmlikemindustry mresearch
mormcustomermlists.
POINTS: 1
QUESTIONmTYPE: MultiplemChoice
HAS mVARIABLES: False
LEARNINGmOBJECTIVES: CIAM.SEC+.22.1.2 m-
mIdentify mthreatmactors mand mtheirmattributes m ACCREDITING mSTANDARDS: m SY0-601.1.5 m-
mExplain mdifferentmthreatmactors, mvectors, mandmintelligence msources. mTOPICS:Who mAre mthe mThreatmActors?
KEYWORDS: Bloom's:mApply
DATEmCREATED: 2/16/2022 m10:23 mPM
DATEmMODIFIED: 2/16/2022 m10:23 mPM
2. Whichmof mthemfollowingmtypesmof mplatformsmismknownmformitsmvulnerabilitiesmduemtomage?
a. On-premisesmplatform
b. Cloud mplatform
c. Legacymplatform
d. Onlinemplatform
ANSWER: c
FEEDBACK: a.mIncorrect. mOn-premises mplatf orms m("on-
prem")maremthemsof twaremand mtechnology mlocated mwithinmanmenterprise's mphys
icalmconf ines, musually mconsolidated minmthemcompany's mdatamcenter.
b. Incorrect. mCloud mplatf orms maremamnewmmodelmgaining mwidespread muse.mThey m
aremampay-per-
usemcomputing mmodelminmwhichmcustomers mpay monly mformthemonlinemcomputin
g mresources mthey mneed.
c. Correct. mLegacy mplatf orms maremno mlongerminmwidespread muse, mof tenmbeca
usemthey mhavembeenmreplaced mby manmupdated mversionmof mthemearliermtech
nology.
d. Incorrect. mAnmonlinemplatf ormmis monemthatmhas mits mf ront mend mand mback mend monline.
CopyrightmCengagemLearning.mPoweredmby mCogne Pagem1
ro.
mynursytest.store
,POINTS: 1
CopyrightmCengagemLearning.mPoweredmby mCogne Pagem2
ro.
mynursytest.store
, DOWNLOAD THE Test Bank for CompTIA Security Guide to Network Security Fundam
m m m m m m m m m m m
entals 7th Edition Ciampa m m m
Name: Class: Date:
Modm01:mIntroductionmto mSecurity
QUESTIONmTYPE: MultiplemChoice
HAS mVARIABLES: False
LEARNINGmOBJECTIVES: CIAM.SEC+.22.1.3 m-mDescribe mthemdifferentmtypesmof mvulnerabilitiesmand mattacks
ACCREDITINGmSTANDARDS:m SY0-601.1.6 m-
mExplain mthe msecurity mconcerns massociated mwith mvarious mtypes mof mvulnerabilities.
TOPICS: Vulnerabilitiesmand mAttack
KEYWORDS: Bloom's:mRemember
DATEmCREATED: 2/16/2022 m10:23 mPM
DATEmMODIFIED: 2/16/2022 m10:23 mPM
3. Yourmenterprisemhasmplayed mfast mand mloosemwithmcustomerminformationmformyears.mWhilemtheremhasmbeenm
nomsignificant mbreachmof minformationmthat mcould mdamagemthemorganizationmand/ormtheirmcustomers,mmanymi
nmthementerprisemfeelmit mismonlymammattermof mtimembeforemammajorm leakmoccurs.
Whichmtypemof mthreat mactormismanmemployeemwhomwishesmtompersonallymensuremthat mthementerprisemismexposed mand mblo
cked mfrommaccessingmtheirmcustomers'minformationmuntilmtheymensuremmoremsecuremprotocols?
a. Hacktivist
b. Insider
c. Statemactor
d. Script mkiddy
ANSWER: a
FEEDBACK:
a.mCorrect. mAmhacktivist mismstronglymmotivated mby mideology mformthemsa
kemof mtheirmprinciples mormbelief s.
b. Incorrect. mThis mserious mthreat mto manmenterprisemcomes mf rommits mownmemploye
es, mcontractors, mand mbusiness mpartners, mcalled minsiders. mThey mposemanminsid
ermthreat mof mmanipulating mdatamf rommthempositionmof mamtrusted memployee.
c. Incorrect. mThesemtypes mof mactors marememployed mbymgovernments mf ormlaunch
ing mcyberattacks magainst mtheirmf oes.
d. Incorrect. mScript mkiddies mdo mtheirmwork mby mdownloading mf reely mavailablem
automated mattack msoftwarem(scripts)mand musing mit mtomperf ormmmalicious ma
cts.
POINTS: 1
QUESTIONmTYPE: MultiplemChoice
HAS mVARIABLES: False
LEARNINGmOBJECTIVES: CIAM.SEC+.22.1.2 m-
mIdentify mthreatmactors mand mtheirmattributes m ACCREDITING mSTANDARDS: m SY0-601.1.5 m-
mExplain mdifferentmthreatmactors, mvectors, mandmintelligence msources. mTOPICS:Who mAre mthe mThreatmActors?
KEYWORDS: Bloom's:mApply
DATEmCREATED: 2/16/2022 m10:23 mPM
DATEmMODIFIED: 2/16/2022 m10:23 mPM
4. Threat mactorsmfocused monmfinancialmgainmoftenmattackmwhichmof mthemfollowingmmainmtarget mcategories?
a. Product mlists
CopyrightmCengagemLearning.mPoweredmby mCogne Pagem3
ro.
mynursytest.store