Knowledge check

Completed

Choose the best response for each of the questions below.

Check your knowledge

1.

You have deployed several defense mechanisms to protect users from Phishing attacks. However, some users are still falling prey to these attacks. Which of the following statements will help educate your users about Phishing?

2.

Northwind Traders has recently been the victim of several cyber security attacks. The attackers have used eavesdropping and man-in-the-middle attacks to steal data in transit across the Internet. Which of the following defense mechanisms can help mitigate the risk of these attacks?

3.

Hackers recently attacked Trey Research by overloading its DNS system with a large number of fake requests. The purpose of this attack was to overload and shut down the server that hosts DNS. What is this common network security threat known as?

4.

Fabrikam is looking to update their antiquated system design. They currently connect their host servers directly to the Internet. While this makes their hosts servers available to Internet users, it also allows those users access to Fabrikam's corporate intranet. Which of the following defense mechanisms should they implement to resolve this issue?

5.

A hacker has captured network packets that workstations connected to your network send and receive. You have concerns that your organization’s sensitive data has been compromised. What is this kind of network-based security threat known as?