Which of the following is an example of a passive attack,
initiated through the Internet?

A. Traffic analysis

B. Masquerading

C. Denial of service

D. E-mail spoofing

Answers were Sorted based on User's Feedback



Which of the following is an example of a passive attack, initiated through the Internet? A. Tra..

Answer / guest

Answer: A

Internet security threats/vulnerabilities are divided into
passive and active attacks. Examples of passive attacks are:
network analysis, eavesdropping and traffic analysis. Active
attacks include: brute-force attack, masquerading, packet
replay, message modification, unauthorized access through
the Internet or web-based services, denial of service,
dial-in penetration attacks, e-mail bombing and spamming,
and e-mail spoofing.

Is This Answer Correct ?    44 Yes 7 No

Which of the following is an example of a passive attack, initiated through the Internet? A. Tra..

Answer / guest

A. Traffic analysis

Is This Answer Correct ?    30 Yes 2 No

Post New Answer

More CISA Certification Interview Questions

During a review of a business continuity plan, an IS auditor noticed that the point at which a situation is declared to be a crisis has not been defined. The MAJOR risk associated with this is that: A. assessment of the situation may be delayed. B. execution of the disaster recovery plan could be impacted. C. notification of the teams might not occur. D. potential crisis recognition might be delayed.

1 Answers  


The FIRST step in developing a business continuity plan (BCP) is to: A. classify the importance of systems. B. establish a disaster recovery strategy. C. determine the critical recovery time period. D. perform a risk ranking.

1 Answers  


Which of the following is a network architecture configuration that links each station directly to a main hub? A. Bus B. Ring C. Star D. Completed connected

1 Answers  


An organization is introducing a single sign-on (SSO) system. Under the SSO system, users will be required to enter only one user ID and password for access to all application systems. Under the SSO system, unauthorized access: A. is less likely. B. is more likely. C. will have a greater impact. D. will have a smaller impact.

1 Answers  


purchase orders issued to vendors have been authorized as per the authorization matrix

0 Answers  






Which of the following would be considered a business risk? A. Former employees B. Part-time and temporary personnel C. Loss of competitive edge D. Hackers

1 Answers  


1. which of the following is used to achieve accountability. a.identification b. authentication c. authorization d. iniation

5 Answers  


Linux is an __________ operating system

2 Answers   Apple,


A primary function of risk management is the identification of cost-effective controls. In selecting appropriate controls, which of the following methods is best to study the effectiveness of adding various safeguards in reducing vulnerabilities? A. "What if" analysis B. Traditional cost/benefit analysis C. Screening analysis D. A "back-of-the-envelope" analysis

1 Answers  


An IS auditor, performing a review of an application?s controls, discovers a weakness in system software, which could materially impact the application. The IS auditor should: A. Disregard these control weaknesses as a system software review is beyond the scope of this review. B. Conduct a detailed system software review and report the control weaknesses. C. Include in the report a statement that the audit was limited to a review of the application?s controls. D. Review the system software controls as relevant and recommend a detailed system software review.

1 Answers  


An independent software program that connects two otherwise separate applications sharing computing resources across heterogeneous technologies is known as: A. middleware. B. firmware. C. application software. D. embedded systems.

1 Answers  


During a post-implementation review of an enterprise resource management system, an IS auditor would MOST likely: A. review access control configuration. B. evaluate interface testing. C. review detailed design documentation. D. evaluate system testing.

2 Answers  


Categories
  • Cisco Certifications Interview Questions Cisco Certifications (2321)
  • Microsoft Certifications Interview Questions Microsoft Certifications (171)
  • Sun Certifications Interview Questions Sun Certifications (45)
  • CISA Certification Interview Questions CISA Certification (744)
  • Oracle Certifications Interview Questions Oracle Certifications (64)
  • ISTQB Certification Interview Questions ISTQB Certification (109)
  • Certifications AllOther Interview Questions Certifications AllOther (295)