cyber security course

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which of the following examples illustrates how malware might be concealed? A botnet of zombies carry personal information back to the hacker A hacker uses techniques to improve the ranking of a website so that users are redirected to a malicious site An attack is launched against the public website of an online retailer with the objective of blocking its response to visitors An email is sent to the employees of an organization with an attachment that looks like an antivirus update, but the attachment actually consists of spyware

An email is sent to the employees of an organization with an attachment that looks like an antivirus update, but the attachment actually consists of spyware

What is the last stage of a pen test? Gathering target information Scanning Maintaining access Analysis and reporting

Analysis and reporting

Behavior-based analysis involves using baseline information to detect what? Anomalies Vulnerabilities Backdoors Risk

Anomalies

Which type of technology can prevent malicious software from monitoring user activities, collecting personal information and producing unwanted pop-up ads on a user computer? Antispyware Firewall Password manager Two factor authentication

Antispyware

As you didn't set the privacy settings before you accepted the terms, default settings were applied.Which of the following do you think is more likely? No one will be able to see information about you and access your profile until you change the preferences in privacy settings Anyone will be able to see information about you and access your profile until you change the privacy settings

Anyone will be able to see information about you and access your profile until you change the privacy settings

Which of the following actions should an organization take in the event of a security breach? Contain the information so that it does not go public Communicate a call to action to all employees Carry out research to uncover what caused the breach Assume this type of breach won't happen again Advise employees to be more careful

Communicate a call to action to all employees Carry out research to uncover what caused the breach

How can you prevent others from eavesdropping on network traffic when operating a PC on a public Wi-Fi hotspot? Connect with a VPN service Use WPA2 encryption Disable Bluetooth Create unique and strong passwords

Connect with a VPN service

Which of the statements correctly describes cybersecurity? Cybersecurity is the ongoing effort to protect individuals, organizations and governments from digital attacks Cybersecurity is the ongoing effort to protect individuals, organizations and governments from crimes that happen only in cyberspace Cybersecurity is the ongoing effort to protect computers, networks and data from malicious attacks

Cybersecurity is the ongoing effort to protect individuals, organizations and governments from digital attacks

What can the skills developed by cybersecurity professionals be used for? Cybersecurity professionals develop many skills that can be only be used for good Cybersecurity professionals develop many skills that can be used for good or evil Cybersecurity professionals develop many skills that can only be used for evil Cybersecurity professionals develop many skills that cannot be used for evil

Cybersecurity professionals develop many skills that can be used for good or evil

Which of the following methods can be used to ensure confidentiality of information?

Data encryption Two-factor authentication Username ID and password

ake a look at the email. Which of the following indicates that it is in fact a phishing email? Email address Customer name Link URL The language, spelling and grammar Graphics

Email address Link URL The language, spelling and grammar Graphics look for that the sender's email domain is spelled incorrectly that the link URL is not pointing to @Apollo's website poor language, spelling and grammar low quality, pixelated graphics

What name is given to a device that controls or filters traffic going in or out of the network? Router Firewall VPN IPS

Firewall

What tool can identify malicious traffic by comparing packet contents to known attack signatures? Nmap IDS NetFlow Zenmap

IDS

What are the foundational principles for protecting information systems as outlined in the McCumber Cube? Access Integrity Scalability Availability Confidentiality Intervention

Integrity Availability Confidentiality

Why might internal security threats cause greater damage to an organization than external security threats? Internal users have better hacking skills Internal users have direct access to the infrastructure devices Internal users can access the organizational data without authentication Internal users can access the infrastructure devices through the Internet

Internal users have direct access to the infrastructure devices

Which of the following characteristics describe a worm? Executes when software is run on a computer Is self-replicating Hides in a dormant state until needed by an attacker Infects computers by attaching to software code Travels to new computers without any intervention or knowledge of the user

Is self-replicating Travels to new computers without any intervention or knowledge of the user

Why do IoT devices pose a greater security risk than other computing devices on a network? Most IoT devices do not receive frequent software updates IoT devices cannot function on an isolated network with only an Internet connection IoT devices require unencrypted wireless connections Most IoT devices do not require an Internet connection and are unable to receive new updates

Most IoT devices do not receive frequent software updates

You decide to update your new job position on your social networks. One of the sites asks you to update your profile information to ensure you receive the content that you really don't want to miss! Which ones do you fill in? Date of birth Email address Mobile phone number Name of the organization Your profile picture Your manager's name and contact information Your colleagues' names and contact information

Name of the organization Your profile picture

How can you keep your personal browsing history hidden from other users on a shared computer? Operate the web browser in private browser mode Reboot the computer after closing the web browser Use only an encrypted connection to access websites Move any downloaded files to the recycle bin

Operate the web browser in private browser mode

What type of attack allows an attacker to use a brute-force approach? Social engineering Password cracking Denial of service Packet sniffing

Password cracking

What is the only way of ensuring that deleted files on your computer are irrecoverable? Using a software program such as SDelete or Secure Empty Trash Emptying your computer's recycle bin Physically destroying your computer's hard drive

Physically destroying your computer's hard drive

Which configuration on a wireless router is not considered to be adequate security for a wireless network? Preventing the broadcast of an SSID Modifying the default SSID and password of a wireless router Enabling wireless security Implementing WPA2 encryption

Preventing the broadcast of an SSID

What should you do in order to make sure that people you live with do not have access to your secure data? Set up password protection Install antivirus software Turn on a firewall Increase the privacy settings on your browser

Set up password protection

The train has an open Wi-Fi network. She contacts you to ask what she should do. What would you advise? She should access the train's open Wi-Fi network and connect to the @Apollo servers using the VPN connection on her work laptop. She should wait until she arrives at the client's office and ask for the access code to their Wi-Fi network, then access @Apollo's service directly on her work laptop. She should use the 4G connection on her phone to find an alternative open Wi-Fi network. She should forget about the contract for the meeting and catch up on other online work using the train's open Wi-Fi to access the https websites she needs.

She should access the train's open Wi-Fi network and connect to the @Apollo servers using the VPN connection on her work laptop.

Which of the following tools can perform real-time traffic and port analysis, and can also detect port scans, fingerprinting and buffer overflow attacks? Snort Nmap NetFlow SIEM

Snort

Which of the following pieces of information would be classified as personal data? Social security number Driver license number Date and place of birth Job title IP address

Social security number Driver license number Date and place of birth

You are looking to print photos that you have saved on a cloud storage account using a third-party online printing service. After successfully logging into the cloud account, you are automatically given access to the third-party online printing service. What allowed this automatic authentication to occur? The password you entered for the online printing service is the same as the password you use for the cloud storage service You are using an unencrypted network which allows the password for the cloud storage service to be viewed by the online printing service Your account information for the cloud storage service was intercepted by a malicious application The cloud storage service is an approved application for the online printing service

The cloud storage service is an approved application for the online printing service

'Securing physical access to target equipment is an organization's best defense against a cyber attack.' Is this true or false?

True

It's your first day on the job, and it's time to choose a username for your online identity. Which of the following options would you choose? Choose 2. jane.doe jdoe1990 jdoe.IT j.doe12 jdoe

jdoe j.doe12 Dont choose usernames with information about your self or with your full name included

What is a security playbook? A collection of repeatable queries or reports that outline a standardized process for incident detection and response A collection of security alerts, logs and historical data from the network A step-by-step guide on how to carry out IT-related procedures

A collection of repeatable queries or reports that outline a standardized process for incident detection and response

You have just signed a Terms of Service agreement. But do you know what this is? Consider the following options and choose the one you think best describes a Terms of Service agreement. A contract outlining the services that you expect to receive from the service provider and how you will use their service An informal arrangement that sets out the rules of the relationship between you, the service provider and others who use the service A legally binding contract that governs the rules of the relationship between you, the service provider and others who use the service

A legally binding contract that governs the rules of the relationship between you, the service provider and others who use the service

A set of changes done to any program or application with the aim of updating, fixing or improving it is often referred to as what? A patch A hack An install A fix

A patch

What is a miner? A person that solves complex mathematical puzzles to verify a transaction A computer that processes and verifies a blockchain transaction A type of blockchain An algorithm that predicts the next block of a chain

A person that solves complex mathematical puzzles to verify a transaction


Conjuntos de estudio relacionados

ART 100 Ch 15: Christianity and the Formation of Europe

View Set

Lesson 12 Eos, Helios and Selene (pp. 80-89)

View Set

Law 2 - Chapter 16 Practice Quiz

View Set

Midterm Exam Practice for Mr.Fowler

View Set

Chapter 8, (js), Polar Coordinates and Vectors

View Set

QuickBooks Online Certification Section 5

View Set

Physics Chapter 2 Structure of the Atom

View Set