Computer Network Technology Practice Questions with complete Solutions Rated A+
_____ are solutions to software programming and coding errors.Word options: Standards, Vulnerability,
Guidelines, Attack Vector, Policies, Risk, Threat, Asset, Patches, Identity Management, Malware, Rootkit,
Payload, Procedure - Answers patches
Outsourcing poses the greatest risk to an organization when it involves - Answers Core business
functions
NIST defines a(n) ________ as a "violation of imminent threat of violation of computer security policies,
acceptable use policies, or standard security practices." - Answers Incident
_____ are solutions to software programming and coding errors. - Answers patches
_____ is a class of malware that hides the existence of other malware by modifying the underlying
operating system.Word options: Standards, Vulnerability, Guidelines, Attack Vector, Policies, Risk,
Threat, Asset, Patches, Identity Management, Malware, Rootkit, Payload, Procedure - Answers rootkit
Put the steps of the penetration testing phase into the correct order.
Attack
Discovery
Reporting
Planning - Answers 3
2
4
1
To which of the following layers of the Open Systems Interconnect (OSI) model would one map
Ethernet? - Answers data link
_____, also called malicious code, is software designed to gain access to targeted computer systems,
steal information or disrupt computer operations.Word options: Standards, Vulnerability, Guidelines,
Attack Vector, Policies, Risk, Threat, Asset, Patches, Identity Management, Malware, Rootkit, Payload,
Procedure - Answers malware
Which element of an incident response plan involves obtaining and preserving evidence? - Answers
containment
Which of the following offers the strongest protection for wireless network traffic? - Answers WPA2