网友您好, 请在下方输入框内输入要搜索的题目:
题目内容
(请给出正确答案)
单选题
Which of the following security threats involves making phone calls?()
A
Phishing
B
Vishing
C
DDoS
D
Xmas attack
参考答案
参考解析
解析:
暂无解析
更多 “单选题Which of the following security threats involves making phone calls?()A PhishingB VishingC DDoSD Xmas attack” 相关考题
考题
Which of the following security threats are MOST likely prevented through user training?()
A. Network IntrusionB. Adware PopupsC. Social EngineeringD. Spam Messages
考题
Which of the following security threats involves making phone calls?()
A.PhishingB.VishingC.DDoSD.Xmas attack
考题
A user receives an email slating that their account was compromised and there is a need to verifyaccount credentials by submitting the correct information on a website.Which of the following security threats is occurring?()A. PhishingB. Smurf attackC. Denial of serviceD. Man-in-the-middle
考题
Operations Security seeks to primarily protect against which of the following? 操作安全的目的主要是防止以下?()A、compromising emanations 损害放射B、facility disaster 设施灾难C、asset threats 资产威胁D、object reuse 对象重用
考题
A technician wants to decrease the overall attack surface of the servers in a data center through decreasing the number of open network ports on each server. Which of the following could the technician implement to increase security?()A、Host based intrusion detection softwareB、Software firewallC、NTFSD、ACL
考题
Which of the following procedure should be performed prior to delivery and generally involves running a suite of operations so as to verify that the solution is applicable for production?()A、Security CheckB、Acceptance TestingC、Project Close OutD、Systems Integration
考题
A user receives an email slating that their account was compromised and there is a need to verify account credentials by submitting the correct information on a website. Which of the following security threats is occurring?()A、PhishingB、Smurf attackC、Denial of serviceD、Man-in-the-middle
考题
Which of the following security threats involves making phone calls?()A、PhishingB、VishingC、DDoSD、Xmas attack
考题
Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()A、The cell phone should require a password after a set period of inactivity.B、The cell phone should only be used for company related emails.C、The cell phone data should be encrypted according to NIST standards.D、The cell phone should have data connection abilities disabled.
考题
Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?()A、Intrusion detectionB、VirtualizationC、KitingD、Cloning
考题
Which of the following security threats are MOST likely prevented through user training?()A、Network IntrusionB、Adware PopupsC、Social EngineeringD、Spam Messages
考题
You need to identify potential security threats. Which of the following security breaches might occur under the current IT and security practices?(Choose all that apply)()A、A virus that infects an IT administrator’s client computer could gain domain administrator privilegesB、Couriers could gain access to domain administrator privilegesC、Business office staff could discover couriers’ passwords and use them to access couriers’ informationD、All users could use their user accounts to gain the ability to install untested security patches on their client computers
考题
单选题Which of the following statements about Audio-lingual Method is wrong?A
The method involves making a comparison between foreign language and mother language.B
The method involves correcting the mistakes timely.C
Mother tongue is accepted in the classroom as the target language.D
Emphasis is laid upon using oral language in the classroom; some reading and writing might be done as homework.
考题
单选题()conduct a background check on the company, making as many phone calls and Internet searches as you can.A
ThoughB
ThroughlyC
ThorughD
Thoroughly
考题
单选题Which of the following security threats are MOST likely prevented through user training?()A
Network IntrusionB
Adware PopupsC
Social EngineeringD
Spam Messages
考题
单选题A technician wants to decrease the overall attack surface of the servers in a data center through decreasing the number of open network ports on each server. Which of the following could the technician implement to increase security?()A
Host based intrusion detection softwareB
Software firewallC
NTFSD
ACL
考题
单选题Which method is of gaining access to a system that bypasses normal security measures?()A
Starting a Smurf attackB
Conducting social engineeringC
Creating a back doorD
Launching a DoS attack
考题
单选题Which of the following is less vulnerable to threats and attacks because it is not associated with one specific operating system?()A
Cisco Voice and Video over VPNB
Cisco Secure Access Control ServerC
Cisco NAC ApplianceD
Cisco Threats Response
考题
单选题Which of the following would an attacker use to footprint a system?()A
RADIUSB
Password crackerC
Port scannerD
Man-in-the-middle attack
考题
单选题A user receives an email slating that their account was compromised and there is a need to verify account credentials by submitting the correct information on a website. Which of the following security threats is occurring?()A
PhishingB
Smurf attackC
Denial of serviceD
Man-in-the-middle
考题
单选题Which of the following security policies is BEST to use when trying to mitigate the risks involved with allowing a user to access company email via their cell phone?()A
The cell phone should require a password after a set period of inactivity.B
The cell phone should only be used for company related emails.C
The cell phone data should be encrypted according to NIST standards.D
The cell phone should have data connection abilities disabled.
考题
单选题Which of the following technologies can be used as a means to isolate a host OS from some types of security threats?()A
Intrusion detectionB
VirtualizationC
KitingD
Cloning
考题
单选题Operations Security seeks to primarily protect against which of the following? 操作安全的目的主要是防止以下?()A
compromising emanations 损害放射B
facility disaster 设施灾难C
asset threats 资产威胁D
object reuse 对象重用
考题
单选题A user receives an email slating that their account was compromised and there is a need to verify account credentials by submitting the correct information on a website. Which of the following security threats is occurring?()A
PhishingB
Smurf attackC
Denial of serviceD
Man-in-the-middle
考题
单选题Which of the following is TRUE according to the passage?A
You should limit your mobile phone calls to personal affairs.B
You should speak quietly into your phone while in a church.C
You are supposed to turn off your mobile phone at a funeral.D
You are supposed to use your mobile phones as much as possible.
考题
单选题You need to identify potential security threats. Which of the following security breaches might occur under the current IT and security practices?(Choose all that apply)()A
A virus that infects an IT administrator’s client computer could gain domain administrator privilegesB
Couriers could gain access to domain administrator privilegesC
Business office staff could discover couriers’ passwords and use them to access couriers’ informationD
All users could use their user accounts to gain the ability to install untested security patches on their client computers
考题
单选题Which of the following is an appropriate title for this passage?A
Cell Phone Radiation: Is It Harmful?B
Cell Phone Radiation: Is It Useful?C
Cell Phone Radiation: Is It Healthy?D
Cell Phone Radiation: Is It Weak?
热门标签
最新试卷