CSS745
Possible threat to any information cannot be
reduced
transferred
protected
—>> ignored
From the options below, which of them is not a vulnerability to information security
—>> flood
without deleting data, disposal of storage media
unchanged default password
latest patches and updates not done
The full form of EDR is …….
Endless Detection and Recovery
Endpoint Detection and recovery
Early detection and response
—>> Endpoint Detection and response
Compromising confidential information comes under ……
Bug
—>> Threat
Vulnerability
Attack
……technology is used for analyzing and monitoring traffic in network and information flow
Cloud access security brokers
Managed detection and response
Network Security Firewall
—>> Network traffic analysis
6. From the options below, which of them is not a threat to information security
Disaster
Eavesdropping
Information leakage
—>> Unchanged default password
…… platforms are used for safety and protection of information in the cloud
—>> Cloud workload protection platforms
Cloud security protocols
AWS
One Drive
Which of the following information security technology is used for avoiding browser-based hacking
Anti-malware in browsers
—>> Remote browser access
Adware remover in browsers
Incognito mode in a browser
Lack of access control policy is a ……..
Bug
Threat
—>> Vulnerability
Attack
………. is the practice and precautions taken to protect valuable information from unauthorised access, recording, disclosure or destruction.
Network Security
Database Security
—>> Information Security
Physical Security
JOIN OUR TELEGRAM ON VIP NOUN UPDATES – FOR FREE CSS745 PAST QUESTIONS AND EXAMS SUMMARIES