Free 212-89 Exam Braindumps (page: 16)

Page 15 of 41

An adversary attacks the information resources to gain undue advantage is called:

  1. Defensive Information Warfare
  2. Offensive Information Warfare
  3. Electronic Warfare
  4. Conventional Warfare

Answer(s): B



An assault on system security that is derived from an intelligent threat is called:

  1. Threat Agent
  2. Vulnerability
  3. Attack
  4. Risk

Answer(s): C



The IDS and IPS system logs indicating an unusual deviation from typical network traffic flows; this is called:

  1. A Precursor
  2. An Indication
  3. A Proactive
  4. A Reactive

Answer(s): B



The largest number of cyber-attacks are conducted by:

  1. Insiders
  2. Outsiders
  3. Business partners
  4. Suppliers

Answer(s): B






Post your Comments and Discuss EC-Council 212-89 exam with other Community members:

212-89 Discussions & Posts