You are on page 1of 1

Module 5 - Unit 1

1. Which property of secure information is compromised by snooping?


- Snooping compromises confidentiality.

2. An attacker has used a rogue access point to intercept traffic passing between wireless
clients and the wired network segment. What type of attack is this?
- This is an impersonation attack.

3. What type of access mechanism is MOST vulnerable to a replay attack?


- The access token mechanism.

4. Which specific attack uses a botnet to threaten availability?


- DoS uses botnet

5. What does AAA stand for?


- Authentication, authorization, and accounting.

6. Why should a security policy instruct users not to reveal their password to technical support
staff?
- A security policy should do this because it would make users aware of masquerading
and its dangers.

7. How might someone masquerade as someone else when using email or Instant Messaging?
- They can act as if they are someone else; someone who they are really not but claim to
be.

8. In considering availability concerns, what use might a lockable faceplate on a server-class


computer be?
- It would protect the computer from any physical threats such as tampering.

9. What are the three main areas where redundancy should be provisioned?
- Data, network, and power

10. Why is prioritization a critical task for disaster recovery?


- It is critical because it gives a way to get the important things done tasks done first.

You might also like