QN A
QN A
o A user receives a phone call from a person who claims to represent IT services and then
Answer: Continuous video surveillance asks that user for confirmation of username and password for auditing purposes. Which
Which statement accurately characterizes the evolution of threats to network security? security threat does this phone call represent?
Answer: Internal threats can cause even greater damage than external threats. • Social engineering.
Which security technology is commonly used by a teleworker when accessing resources on 11. Which evasion method describes the situation where after gaining access to the
the main corporate office network? o Answer: VPN administrator password on a compromised host, a threat actor attempts to log in to another
A security intern is reviewing the corporate network topology diagrams before participating host using the same credentials?
in a security review. Which network topology would commonly have a large number of • Pivoting.
wired desktop computers? 12. In what type of attack is a cybercriminal attempting to prevent legitimate users from
Answer: CAN (Campus Area Network) accessing network services?
In the video that describes the anatomy of an attack, a threat actor was able to gain access • DoS (Denial-of-Service).
through a network device, download data, and destroy it. Which flaw allowed the threat
actor to do this? o Answer: A flat network with no subnets or VLANs
Which type of network commonly makes use of redundant air conditioning and a security
trap? o Answer: Data center
Which technology is used to secure, monitor, and manage mobile devices? o
Answer: MDM (Mobile Device Management)
When considering network security, what is the most valuable asset of an organization? o
Answer: Data
What is hyperjacking?
Answer: Taking over a virtual machine hypervisor as part of a data center attack
Is self-replicating.