Search Header Logo
12.1-12.2 Security Concepts and Risk Management

12.1-12.2 Security Concepts and Risk Management

Assessment

Presentation

Computers

10th Grade

Practice Problem

Hard

Created by

Nathan Pettijohn

Used 2+ times

FREE Resource

16 Slides • 6 Questions

1

media

2

media

3

media

4

Multiple Choice

Which of the following is an example of an internal threat?

1

A server backdoor allows an attacker on the internet to gain access to the intranet site.

2

A user accidentally deletes the new product designs.

3

A delivery man is able to walk into a controlled area and steal a laptop.

4

A water pipe in the server room breaks.

5

media

6

media

7

media

8

Multiple Choice

Telnet is inherently unsecure because its communication is in plaintext and is easily intercepted. Which of the following is an acceptable alternative to Telnet?

1

SSH

2

SLIP

3

Remote Desktop

4

PPP

9

Multiple Choice

Which protocol does HTTPS use to offer greater security for web transactions?

1

PAP

2

IPsec

3

CHAP

4

SSL

10

media

11

media

12

media

13

Multiple Choice

When a wired or wireless host tries to connect to the network, a NAC agent on the host checks it to make sure it has all of the latest operating system updates installed and that the latest antivirus definitions have been applied.

1

Port Security

2

Remediation

3

Quarantine

4

Posture Assessment

14

media

15

media

16

media

17

media

18

Multiple Choice

Which of the following types of penetration test teams provides you with information that is most pertinent to a real-world attack?

1

Full knowledge team

2

Zero knowledge team

3

Partial knowledge team

4

Split knowledge team

19

media

20

media

21

media

22

Multiple Select

Which of the following activities are typically associated with a penetration test? (Select two.)

1

Interviewing employees to verify that the security policy is being followed.

2

Running a vulnerability scanner on network servers.

3

Attempting social engineering.

4

Running a port scanner.

5

Creating a performance baseline.

media

Show answer

Auto Play

Slide 1 / 22

SLIDE