1. Which of the following attacks specifically impact data availability?
A) DDoS B) MITM C) Trojan D) Rootkit
2. Users in a corporation currently authenticate with a username and password. A security administrator wishes to implement two-factor authentication to improve security. Which of the following authentication methods should be deployed to achieve this goal?
A) CAPTCHA B) Security question C) Smart card D) Passphrase E) PIN
3. Which of the following are the MAIN reasons why a systems administrator would install security patches in a staging environment before the patches are applied to the production server? (Select two.)(Select 2answers)
A) To verify the appropriate patch is being installed B) To allow users to test functionality C) To prevent server availability issues D) To generate a new baseline hash after patching E) To ensure users are trained on new functionality
4. Which of the following BEST describes a network-based attack that can allow an attacker to take full control of a vulnerable host?
A) Amplification B) Man-in-the-middle C) Sniffing D) Remote exploit
5. Six months into development,the core team assigned to implement a new internal piece of software must convene to discuss a new requirement with the stake holders. A stakeholder identified a missing feature critical to the organization,which must be implemented. The team needs to validate the feasibility of the newly introduced requirement and ensure it does not introduce new vulnerabilities to the software and other applications that will integrate with it. Which of the following BEST describes what the company?
A) The system analysis phase of SSDSLC B) The system integration phase of the SDLC C) The system development phase of the SDLC D) The system design phase of the SDLC
1. Right Answer: A Explanation: Reference: https://www.netscout.com/what-is-ddos
Leave a comment