1. Threats, Attacks, and Vulnerabilities

Domain 1 Questions

  1. After conducting a vulnerability scan of her network, Wendy discovered the issue shown here on several servers. What is the most significant direct impact of this vulnerability?

    Figure 1.1

    A. Attackers may eavesdrop on network communications.

    B. Attackers may use this information to gain administrative privileges.

    C. Encryption will not protect credentials for this account.

    D. Automated attacks are more likely to succeed.

  2. Pete is investigating a domain hijacking attack against his company that successfully redirected web traffic to a third-party website. Which one of the following techniques ...

Get Security+® Practice Tests now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.