ibm security.docx - Select the answer the fills in the...

This preview shows page 1 - 5 out of 34 pages.

Select the answer the fills in the blanks in the correct order. A weakness in a system is a/an ____. The potential danger associated with this is a/an ____ that becomes a/an ____ when attacked by a bad actor. 1 / 1 point threat actor, vulnerability, exposure vulnerability, threat, exploit risk, exploit, threat threat, exposure, risk
Correct Correct! 2. Question 2 Fancy Bears and Anonymous are examples of what? 1 / 1 point
3. Question 3 What would a piece of malicious code that gets installed on a computer and reports back to the controller your keystrokes and other information it can gather from your system be called?
0 / 1 point
4. Question 4 To engage in packet sniffing, you must implement promiscuous mode on which device? 0 / 1 point
5. Question 5 Trudy intercepts a plain text message sent by Alice to Bob but in no way interferes with its delivery. Which aspect of the CIA Triad was violated? 0 / 1 point Confidentiality
Integrity Availability All of the above Incorrect Incorrect, this material was covered in the course Introduction to Cybersecurity Tools & Cyber Attacks, Week 3 - An overview of key security concepts
6. Question 6 Trudy intercepts a romantic plain-text message from Alice to her boyfriend Sam. The message upsets Trudy so she forwards it to Bob, making it look like Alice intended it for Bob from the beginning. Which aspect of the CIA Triad has Trudy violated?
7. Question 7 Which factor contributes most to the strength of an encryption system? 0 / 1 point
The length of the encryption key used The number of private keys used by the system Incorrect Incorrect, this material was covered in the course Introduction to Cybersecurity Tools & Cyber Attacks, Week 4 - An overview of key security tools

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture