A fake computer that looks authentic is known as this
Honeypot
100
Sending out a fake email with a malicious payload.
Phishing
100
True or False a fence is considered a physical security device.
True
100
You would use this process to only allow personnel access to information that they absolutely need in order to complete their job.
Limiting
100
In risk mitigation, we could purchase this for extended coverage on our assets
Insurance
200
Well known ports fall in this range.
0-1023
200
Only people in major businesses need to worry about social engineering attacks.
False
200
The low orbit ion cannon is typically used for these types of attacks
DoS or DDoS
200
It is important to have multiple of defense in a network, it is also known as ________
layering
200
In risk mitigation, we can take this action if we no longer want the risk to be our problem.
Transfer the risk.
300
A common method for stopping SQL injections is to do this.
Input validation
300
Gathering personal information under false pretenses such as using a survey is known as this.
Pretexting
300
The CIA triad stands for this
Confidentiality, Integrity, Availability
300
Bob from accounting has decided he's fed up with the poor wireless signal he gets from his desk, one day he brings in his own wireless router and hooks it up under his desk. What has Bob done?
Set up a Rogue Access Point
300
In risk mitigation, we can take this action if the probability and cost is very low.
Accept the Risk
400
By manipulating javascript, HTML or flash we can execute these types of attacks.
XSS
400
Leaving your garbage on the side of the road and having someone go through it is known as this.
Dumpster Diving
400
AAA stands for this
Authentication, Authorization, Accounting
400
Based off of the attacker methodology, once an attacker has scanned a network and gathered necessary information their next step is this.
Penetrate any defenses.
400
In risk mitigation, we can take this action if we want to reduce the probability that a loss will occur.
Diminish the risk
500
Significantly different from regular cookies. Can’t be deleted through the browsers normal settings. Larger than normal cookies, can reinstate regular cookies that a user has deleted or blocked
Flash Cookie
500
Gathering information from someone on an IRC or IM is known as this.
Chat Attack
500
A Bayesian filter is used by this.
Anti-Spam software.
500
This is known as an imaginary line of set standards which devices must meet before being allowed on the network.
Baseline
500
This plan allows you to make sure your company continues to operate in the face of a disaster.