Phishing
Vishing
DDoS
Xmas attack
第1题:
A user receives an email slating that their account was compromised and there is a need to verifyaccount credentials by submitting the correct information on a website.Which of the following security threats is occurring?()
A. Phishing
B. Smurf attack
C. Denial of service
D. Man-in-the-middle
第2题:
A technician wants to decrease the overall attack surface of the servers in a data center through decreasing the number of open network ports on each server. Which of the following could the technician implement to increase security?()
第3题:
A. Network Intrusion
B. Adware Popups
C. Social Engineering
D. Spam Messages
第4题:
Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()
第5题:
A user receives an email slating that their account was compromised and there is a need to verify account credentials by submitting the correct information on a website. Which of the following security threats is occurring?()
第6题:
Operations Security seeks to primarily protect against which of the following? 操作安全的目的主要是防止以下?()
第7题:
Which of the following procedure should be performed prior to delivery and generally involves running a suite of operations so as to verify that the solution is applicable for production?()
第8题:
A.Phishing
B.Vishing
C.DDoS
D.Xmas attack
第9题:
Which of the following security threats involves making phone calls?()
第10题:
Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?()