Questions
Now it's time to check your knowledge. Select the best response, then check your answers, found in the Assessment section at the end of the book:
- _____ attacks do not interfere with the system or data integrity and include activity such as scanning or eavesdropping using packet analysis.
a. Vector
b. Modified
c. Active
d. Passive
- _____ attacks seek to disrupt services, modify, steal, or destroy data, and include attacks such as Denial of Service (DoS) attacks or releasing malware.
a. Vector
b. Modified
c. Active
d. Passive
- An attack _____ is a path or means by which a malicious actor can access a system and includes storage devices, email, mobile devices, cloud storage, and malware.
a. vector
b. stage
c. appliance
d. wall
- Network _____ that protect our networks include intrusion detection/intrusion prevention systems, along with firewalls that are tuned to allow or deny traffic based on a set of rules.
a. stages
b. policies
c. attacks
d. appliances
- A _____...