Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A prolonged, targeted cyberattack where an intruder remains undetected for an extended period is called:

A.

Spoofing

B.

Phishing

C.

DoS

D.

Advanced Persistent Threat

Activities necessary to restore IT and communications services are known as:

A.

Incident response

B.

Business continuity

C.

Risk management

D.

Disaster recovery

A company analyzes system requirements, functions, and interdependencies to prioritize contingency needs. What is this process called?

A.

BCP

B.

DRP

C.

IRP

D.

BIA

How does IPSec protect against replay attacks?

A.

By using sequence numbers

B.

By limiting network access

C.

By using digital signatures

D.

By encrypting all traffic

Which of the following is a characteristic of cloud computing?

A.

Broad network access

B.

Rapid elasticity

C.

Measured service

D.

All

An unknown person obtains unauthorized access to the company file system. This is an example of:

A.

Intrusion

B.

Breach

C.

Exploit

D.

Incident

Which plan provides immediate response procedures and management guidance?

A.

BCP

B.

IRP

C.

DRP

D.

All

An integrated platform and graphical tool for security testing of web applications is:

A.

Burp Suite

B.

Wireshark

C.

Fiddler

D.

Zenmap

Configuration settings or parameters stored as data and managed through a GUI are examples of:

A.

Logical access control

B.

Physical access control

C.

Administrative access control

An approach using software-based controllers and APIs to direct network traffic:

A.

VLAN

B.

SDN

C.

VPN

D.

SAN