CIS 359 STUDY Extraordinary Success /cis359study.com CIS 359 STUDY Extraordinary Success /cis359study.c | Page 14

• Question 35 When an alert warns of new malicious code that targets software used by an organization, the first response should be to research the new virus to determine whether it is ____. • Question 36 In a “block” containment strategy, in which the attacker’s path into the environment is disrupted, you should use the most precise strategy possible, starting with ____. • Question 37 If a user receives a message whose tone and terminology seems intended to invoke a panic or sense of urgency, it may be a(n) ____. • Question 38 Many malware attacks are ____ attacks, which involve more than one type of malware and/or more than one type of transmission method. • Question 39 A ____ is a small quantity of data kept by a Web site as a means of recording that a system has visited that Web site. • Question 40 A(n) ____ attack is a method of combining attacks with rootkits and back doors. • Question 41 According to NIST, which of the following is an example of a UA attack? • Question 42