Question 1 of 5 Share Facebook Twitter LinkedIn WhatsApp Email Copy Link An administrator is estimating the cost associated with an attack that could result in the replacement of a physical server. Which of the following processes is the administrator performing? A. Quantitative risk analysis B. Disaster recovery test C. Physical security controls review D. Threat modeling Submit Answer
Question 2 of 5 Share Facebook Twitter LinkedIn WhatsApp Email Copy Link During a SQL update of a database, a temporary field used as part of the update sequence was modified by an attacker before the update completed in order to allow access to the system. Which of the following best describes this type of vulnerability? A. Race condition B. Memory injection C. Malicious update D. Slice loading Submit Answer
Question 3 of 5 Share Facebook Twitter LinkedIn WhatsApp Email Copy Link Which of the following attacks primarily targets insecure networks? A. Evil twin B. Impersonation C. Watering hole D. Pretexting Submit Answer
Question 4 of 5 Share Facebook Twitter LinkedIn WhatsApp Email Copy Link Which of the following is the most likely benefit of conducting an internal audit? A. Findings are reported to shareholders. B. Reports are not formal and can be reassigned. C. Control gaps are identified for remediation. D. The need for external audits is eliminated. Submit Answer
Question 5 of 5 Share Facebook Twitter LinkedIn WhatsApp Email Copy Link Which of the following provides the best protection against unwanted or insecure communications to and from a device? A. System hardening B. Host-based firewall C. Intrusion detection system D. Anti-malware software Submit Answer