Reference no: EM133358383
Questions
1. An IT professional makes a backup of critical information from a company's system so it can still be accessed if the system is attacked. Which key principle for designing information security policies does this represent?
The integrity principle
The risk principle
The availability principle
The intelligence principle
2. Which of the following is an example of a zero-day vulnerability?
A group of hackers finds a flaw in a new software product and takes advantage of it before the vendor or developer finds it.
A user voluntarily downloads a piece of software hoping it will be useful, but instead it lets hackers access the user's computer.
A user accidentally loads malware onto a computer that logs the user's keypresses and uses them to get confidential information.
After a user downloads and starts a piece of software, it starts showing ads and collecting data.
3. Which of the following can occur during a ping of death (POD) attack? Select all that apply.
Execution of malicious code
A buffer overflow
Baiting
Phishing