Assessment Test

  1. Jim wants to place a device in the network demilitarized zone that may be broken into by an attacker so that he can evaluate the strategies that hackers are using on his systems. Which of the following best describes what he would use?

    A. Honeypot

    B. Decoy system

    C. Honeybucket

    D. Spoofing system

  2. Frank calls you from the Los Angeles office to inform you of an attack he has discovered. Due to a vulnerability in an application, an attacker has the ability to intervene in a communications session by inserting a computer between the two participants. To each participant, the attacker appears to be the other participant. Which of the following best describes this type of attack?

    A. Man-in-the-middle attack

    B. DNS hijacking

    C.

Get SSCP (ISC)2 Systems Security Certified Practitioner Official Study Guide now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.