What does the term vulnerability mean?

Cisco 1

Quiz
•
Physics
•
Professional Development
•
Hard
Roger White
FREE Resource
11 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
a potential threat that a hacker creates
a weakness that makes a target susceptible to an attack
a method of attack to exploit a target
a known target or victim machine
a computer that contains sensitive information
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The employees in a company receive an email stating that the account password will expire immediately and requires a password reset within 5 minutes. Which statement would classify this email?
It is a piggy-back attack.
It is a hoax.
It is an impersonation attack.
It is a DDoS attack.
3.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What three best practices can help defend against social engineering attacks? (Choose three.)
Do not provide password resets in a chat window.
Deploy well-designed firewall appliances.
Enable a policy that states that the IT department should supply information over the phone only to managers.
Educate employees regarding policies.
Resist the urge to click on enticing web links.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A cyber criminal sends a series of maliciously formatted packets to the database server. The server cannot parse the packets and the event causes the server to crash. What is the type of attack the cyber criminal launches?
SQL injection
DoS
packet Injection
man-in-the-middle
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A security service company is conducting an audit in several risk areas within a major corporate client. What attack or data loss vector term would be used to describe providing access to corporate data by gaining access to stolen or weak passwords?
improper access control
hard copy
an internal threat
unencrypted devices
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
A social media site is describing a security breach in a sensitive branch of a national bank. In the post, it refers to a vulnerability. What statement describes that term?
A weakness in a system or its design that could be exploited by a threat.
The actions that are taken to protect assets by mitigating a threat or reducing risk.
The potential damage to the organization that is caused by the threat.
The likelihood that a particular threat will exploit a vulnerability of an asset and result in an undesirable consequence.
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the first line of defense to protect a device from improper access control?
passwords
end user license agreement (EULA)
shredding
encryption
Create a free account and access millions of resources
Similar Resources on Quizizz
10 questions
Bernoulli Principle

Quiz
•
Professional Development
16 questions
Really really really hard

Quiz
•
University - Professi...
14 questions
electrical science 202

Quiz
•
Professional Development
10 questions
Types of Energy

Quiz
•
10th Grade - Professi...
10 questions
Aerodynamics Quiz

Quiz
•
Professional Development
10 questions
M8.3 Aerodynamics Forces Relationship

Quiz
•
Professional Development
15 questions
PoF Chapter 7 Stall

Quiz
•
Professional Development
13 questions
M8.3 Load Factor

Quiz
•
Professional Development
Popular Resources on Quizizz
15 questions
Character Analysis

Quiz
•
4th Grade
17 questions
Chapter 12 - Doing the Right Thing

Quiz
•
9th - 12th Grade
10 questions
American Flag

Quiz
•
1st - 2nd Grade
20 questions
Reading Comprehension

Quiz
•
5th Grade
30 questions
Linear Inequalities

Quiz
•
9th - 12th Grade
20 questions
Types of Credit

Quiz
•
9th - 12th Grade
18 questions
Full S.T.E.A.M. Ahead Summer Academy Pre-Test 24-25

Quiz
•
5th Grade
14 questions
Misplaced and Dangling Modifiers

Quiz
•
6th - 8th Grade