CIS 359 STUDY Extraordinary Success /cis359study.com CIS 359 STUDY Extraordinary Success /cis359study.c | Page 14
•
Question 35
When an alert warns of new malicious code that targets
software used by an organization, the first response should be to
research the new virus to determine whether it is ____.
•
Question 36
In a “block” containment strategy, in which the attacker’s path
into the environment is disrupted, you should use the most precise
strategy possible, starting with ____.
•
Question 37
If a user receives a message whose tone and terminology
seems intended to invoke a panic or sense of urgency, it may be a(n)
____.
•
Question 38
Many malware attacks are ____ attacks, which involve more
than one type of malware and/or more than one type of transmission
method.
•
Question 39
A ____ is a small quantity of data kept by a Web site as a
means of recording that a system has visited that Web site.
•
Question 40
A(n) ____ attack is a method of combining attacks with
rootkits and back doors.
•
Question 41
According to NIST, which of the following is an example of a
UA attack?
•
Question 42