Q: A hacker exploited a bug in the software and triggered unintended behavior which led to the system being compromised by running vulnerable software. Which of these helps to fix these types of vulnerabilities? or Q: Vulnerable software on the system was infiltrated by a hacker who took advantage of a software defect and caused unexpected behavior. Which of these…
-
-
What are the two primary purposes of application software policies? Select all that apply.
Q: What are the two primary purposes of application software policies? Select all that apply. or Q: What are application software policies’ two main goals? Choose every option that pertains. To help educate users on how to use software more securely Correct To take log data and convert it into different formats To use a database of signatures to identify…
-
When installing updates on critical infrastructure, it’s important to be what?
Q: When installing updates on critical infrastructure, it’s important to be what? or Q: What is crucial to be while installing updates on vital infrastructure? Careful Patient Calm Fast Explanation: Carefulness ensures that updates are applied correctly without disrupting critical systems, which helps to avoid potential downtime or unintended consequences.
-
What is a defining characteristic of a defense-in-depth strategy to IT security?
Q: What is a defining characteristic of a defense-in-depth strategy to IT security? or Q: What quality distinguishes a defense-in-depth approach to IT security? Confidentiality Multiple overlapping layers of defense Strong passwords Encryption Explanation: This approach involves implementing several layers of security controls and measures to protect information and systems. The idea is that if one layer is breached, other…
-
Ideally, an attack surface is
Q: Ideally, an attack surface is or Q: An assault surface should ideally be open and defended. as small as possible. frequently updated. as large as possible. Explanation: Reducing the attack surface minimizes the number of potential entry points for attackers, which helps to decrease the likelihood of successful attacks and simplifies security management.
-
In the Payment Card Industry Data Security Standard (PCI DSS), what are the requirements for the “regularly monitor and test networks” objective? Select all that apply
Q: In the Payment Card Industry Data Security Standard (PCI DSS), what are the requirements for the “regularly monitor and test networks” objective? Select all that apply or Q: What does the Payment Card Industry Data Security Standard (PCI DSS) “regularly monitor and test networks” objective require? Choose every option that pertains. Track and monitor all access to network resources…
-
What tools can be used to discover vulnerabilities or dangerous misconfigurations in systems and networks?
Q: What tools can be used to discover vulnerabilities or dangerous misconfigurations in systems and networks? or Q: What instruments are available for identifying hazardous configuration errors or weaknesses in systems and networks? Firewalls Bastion hosts Antimalware software Vulnerability scanners Explanation: Vulnerability scanners are designed to identify security weaknesses, potential vulnerabilities, and misconfigurations in systems and networks. They help organizations…
-
What is penetration testing?
Q: What is penetration testing? or Q: Penetration testing: what is it? Assessing computers, computer systems, networks, or applications for weaknesses. Giving network access to a bad actor for testing. Attempting to gather credentials with phishing emails. Attempting to break into a system or network for the purpose of verifying the systems in place. Explanation: Penetration testing involves simulating cyberattacks…
-
Which of the following devices are considered a risk when storing confidential information? Select all that apply.
Q: Which of the following devices are considered a risk when storing confidential information? Select all that apply. or Q: Which of the following gadgets should never be used to store sensitive data? Choose every option that pertains. Limited access file shares Encrypted portable hard drives CD drives USB sticks Explanation: These devices are considered risky because they can be…
-
Which of the following are bad security habits commonly seen amongst employees in the workplace? Select all that apply.
Q: Which of the following are bad security habits commonly seen amongst employees in the workplace? Select all that apply. or Q: Which of the following are poor security practices that you frequently observe in workers at work? Choose every option that pertains. Password on a post-it note Leave laptop logged in and unattended Correct Log out of website session…