146 in general arise from improperly installed or configured software and from unfor 4312587

146 in general arise from improperly installed or configured software and from unfor 4312587

146) In general, ________ arise from improperly installed or configured software and from unforeseen defects or deficiencies in the software.

A) exploits

B) virtualizations

C) vulnerabilities

D) exposures

147) Sabotage is a(n) ________ threat.

A) active

B) passive

C) direct

D) second layer

148) Input ________ is an example of a system attack method.

A) vector

B) manipulation

C) hacking

D) buffer

149) ________ involves running multiple operating systems, or multiple copies of the same operating system, all on the same machine.

A) Hypervisor

B) Business continuity planning

C) Virtualization

D) Subscriber Identity Module (SIM)

150) All software and data is stored by the SaaS provider in the

A) hypervisor.

B) cloud.

C) stars.

D) grid.

151) ________ computing involves clusters of interlinked computers that share common workloads.

A) Grid

B) Cloud

C) Networked

D) Malware

152) Which of the following forms of social engineering involves impersonation?

A) Contexting

B) Phishing

C) Hypervising

D) Pretexting

153) Botnets are normally used for which of the following?

A) Grid computing

B) Denial of service attacks

C) Continuity planning

D) Cloud computing

154) Adware is a type of

A) virus.

B) logic bomb.

C) spyware.

D) Trojan horse.

155) On the local workstation, cloud computing

A) complicates security considerations.

B) simplifies security considerations.

C) is not involved with security considerations.

D) affects security minimally but still must be considered under ISO 27000.

156) In the following, which source of information security frameworks or standards targets managers rather than IP professionals?

A) COSO

B) ISMS

C) COBIT

D) ISO

1

"Get 15% discount on your first 3 orders with us"
Use the following coupon
"FIRST15"

Order Now

Related Posts