此浏览器不再受支持。
请升级到 Microsoft Edge 以使用最新的功能、安全更新和技术支持。
Choose the best response for each of the questions below.
You have deployed several defense mechanisms to protect users from Phishing attacks. However, some users are still falling prey to these attacks. Which of the following statements will help educate your users about Phishing?
Scammers imitate someone you know, so verify their email address rather than contact information or brand accuracy
Hover over links to uncover the URL
Phishing scams are exclusively perpetrated in email
Northwind Traders has recently been the victim of several cyber security attacks. The attackers have used eavesdropping and man-in-the-middle attacks to steal data in transit across the Internet. Which of the following defense mechanisms can help mitigate the risk of these attacks?
Intrusion detection
Domain Name System Security Extensions
VPNs and DirectAccess
Hackers recently attacked Trey Research by overloading its DNS system with a large number of fake requests. The purpose of this attack was to overload and shut down the server that hosts DNS. What is this common network security threat known as?
Man-in-the-middle attack
Denial of service attack
Brute force network attack
Fabrikam is looking to update their antiquated system design. They currently connect their host servers directly to the Internet. While this makes their hosts servers available to Internet users, it also allows those users access to Fabrikam's corporate intranet. Which of the following defense mechanisms should they implement to resolve this issue?
Perimeter networks
Internet Protocol security (IPsec)
Firewalls
A hacker has captured network packets that workstations connected to your network send and receive. You have concerns that your organization’s sensitive data has been compromised. What is this kind of network-based security threat known as?
Port scanning
Eavesdropping
You must answer all questions before checking your work.
此页面是否有帮助?