Match the type of information security threat to the scenario Not all options are used

Match the type of information security threat to the scenario Not all options are used

Introduction to Networks ( Version 7.00) – Modules 16 – 17: Building and

Securing a Small Network Exam

1. Which component is designed to protect against unauthorized communications

to and from a computer?

security center

port scanner

antimalware

antivirus

firewall

2. Which command will block login attempts on RouterA for a period of 30 seconds

if there are 2 failed login attempts within 10 seconds?

RouterA(config)# login block-for 10 attempts 2 within 30

RouterA(config)# login block-for 30 attempts 2 within 10

RouterA(config)# login block-for 2 attempts 30 within 10

RouterA(config)# login block-for 30 attempts 10 within 2

3. What is the purpose of the network security accounting function?

to require users to prove who they are

to determine which resources a user can access

to keep track of the actions of a user

to provide challenge and response questions

4. What type of attack may involve the use of tools such as nslookup and fping?

access attack

reconnaissance attack

denial of service attack

worm attack

5. Match each weakness with an example. (Not all options are used.)

What are the types of threats in information security?

Cyber security threats are any possible malicious attacks which enable unlawful access to data, disrupt digital operations or damage information. Such threats can come from corporate spies, hacktivists, terrorist groups, hostile nation-states, criminal organizations, lone hackers, or even disgruntled employees.

What are the six 6 common types of threats?

The six types of security threat.
Cybercrime. Cybercriminals' principal goal is to monetise their attacks. ... .
Hacktivism. Hacktivists crave publicity. ... .
Insiders. ... .
Physical threats. ... .
Terrorists. ... .
Espionage..

What are the three 3 categories of threats to security?

In particular, these three common network security threats are perhaps the most dangerous to enterprises: malware. advanced persistent threats. distributed denial-of-service attacks.

What are the types of threats?

Threats can be classified into four different categories; direct, indirect, veiled, conditional.