单选题Which of the following security threats involves making phone calls?()A PhishingB VishingC DDoSD Xmas attack

题目
单选题
Which of the following security threats involves making phone calls?()
A

Phishing

B

Vishing

C

DDoS

D

Xmas attack

如果没有搜索结果或未解决您的问题,请直接 联系老师 获取答案。
相似问题和答案

第1题:

A user receives an email slating that their account was compromised and there is a need to verifyaccount credentials by submitting the correct information on a website.Which of the following security threats is occurring?()

A. Phishing

B. Smurf attack

C. Denial of service

D. Man-in-the-middle


参考答案:A

第2题:

A technician wants to decrease the overall attack surface of the servers in a data center through decreasing the number of open network ports on each server. Which of the following could the technician implement to increase security?()

  • A、Host based intrusion detection software
  • B、Software firewall
  • C、NTFS
  • D、ACL

正确答案:B

第3题:

Which of the following security threats are MOST likely prevented through user training?()

A. Network Intrusion

B. Adware Popups

C. Social Engineering

D. Spam Messages


参考答案:C

第4题:

Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()

  • A、The cell phone should require a password after a set period of inactivity.
  • B、The cell phone should only be used for company related emails.
  • C、The cell phone data should be encrypted according to NIST standards.
  • D、The cell phone should have data connection abilities disabled.

正确答案:A

第5题:

A user receives an email slating that their account was compromised and there is a need to verify account credentials by submitting the correct information on a website. Which of the following security threats is occurring?()

  • A、Phishing
  • B、Smurf attack
  • C、Denial of service
  • D、Man-in-the-middle

正确答案:A

第6题:

Operations Security seeks to primarily protect against which of the following? 操作安全的目的主要是防止以下?()

  • A、compromising emanations 损害放射
  • B、facility disaster 设施灾难
  • C、asset threats 资产威胁
  • D、object reuse 对象重用

正确答案:C

第7题:

Which of the following procedure should be performed prior to delivery and generally involves running a suite of operations so as to verify that the solution is applicable for production?()

  • A、Security Check
  • B、Acceptance Testing
  • C、Project Close Out
  • D、Systems Integration

正确答案:B

第8题:

Which of the following security threats involves making phone calls?()

A.Phishing

B.Vishing

C.DDoS

D.Xmas attack


参考答案:B

第9题:

Which of the following security threats involves making phone calls?()

  • A、Phishing
  • B、Vishing
  • C、DDoS
  • D、Xmas attack

正确答案:B

第10题:

Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?()

  • A、Intrusion detection
  • B、Virtualization
  • C、Kiting
  • D、Cloning

正确答案:B

更多相关问题