SY0-410:3 TS THREATS AND VULNERABILITIES EXAM QUESTIONS WITH CORRECT VERIFIED ANSWERS GUARANTEED PASS
1 view 0 purchase
Module
SY0-410
Institution
SY0-410
SY0-410:3 TS THREATS AND VULNERABILITIES EXAM QUESTIONS WITH CORRECT VERIFIED ANSWERS GUARANTEED PASS
What is the term for a potential opening in network security that a hacker can exploit to attack a network?
a vulnerability
According to CompTIA's Security+ examination blueprint, what are t...
QUESTIONS WITH CORRECT VERIFIED ANSWERS GUARANTEED
PASS
What is the term for a potential opening in network security that a hacker can
exploit to attack a network?
a vulnerability
According to CompTIA's Security+ examination blueprint, what are the four
hardening techniques for mitigation and deterrence?
"Disable unnecessary services.
Protect management interfaces and applications.
Protect passwords.
Disable unnecessary accounts."
Which self-replicating computer program sends copies of itself to other devices
on the network?
a worm
What is vishing?
a special type of phishing that uses Voice over IP (VoIP)
Is instant messaging vulnerable to packet sniffing?
yes
What is whaling?
, a special type of phishing that targets a single power user, such as a Chief Executive
Officer (CEO)
Are cameras and IDSs considered to be mitigation or prevention controls?
deterrence controls
Which attack is an extension of the denial-of-service (DoS) attack and uses
multiple computers?
a distributed DoS (DDoS) attack
What is a malicious insider?
an employee who uses his access to the network and facility to obtain confidential
information
What is an attempt by someone to get one or more users to believe that a specific
computer virus exists?
a hoax
What is Nessus?
a network vulnerability scanner
What is a flaw, loophole, or weakness in the system, software, or hardware?
a vulnerability
According to CompTIA's Security+ examination blueprint, what are the seven
listed reasons for effectiveness for social engineering attacks?
authority, intimidation, consensus/social proof, scarcity, urgency, familiarity/liking, and
trust
According to CompTIA's Security+ examination blueprint, what are the three
listed security posture techniques for mitigation and deterrence?
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller NurseAdvocate. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for £8.18. You're not tied to anything after your purchase.