Cyber-security Final Exam

¡Supera tus tareas y exámenes ahora con Quizwiz!

What is the main purpose of cyberwarfare?

To gain advantage over adversaries

What is the purpose of Packet Tracer?

To simulate and visualize one or more networks

Which tool would you use to grab and lift small objects?

3-prong holder

Cloud services

A collection of data centers or connected servers that provide anywhere anytime access to data and applications

Hadoop

A comprehensive ecosystem of open-source software for big data management

What device provides auto discovery services for smart devices that are connected to the network?

A home gateway

Which of the following statement about cleaning monitors and display devices is true?

A monitor should be powered off and cleaned with a lint free cloth.

You need to trace the route that a Cat 6 UTP cable takes through the ceiling and walls of your building. Which tool should you use?

A tone generator

When describing malware, what is a difference between a virus and a worm?

A virus replicates itself by attaching to another file, whereas a worm can replicate itself independently.

A PC technician knows he will be late to an appointment with a customer. Which of the following actions should the technician take?

Contact the customer and apologize and Give a realistic time frame for your arrival.

What action will an IDS take upon detection of malicious traffic?

Create a network alert and log the detection

You are providing telephone support for a user who is trying to connect a computer to a projector. You know that the projector only has a VGA port.

D-shaped with 15 pins

An employee does something as a company representative with the knowledge of that company and this action is deemed illegal. The company would be legally responsible for this action.

True

The IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which type of security attack is occurring?

DDoS

What type of attack uses zombies?

DDoS

You are helping a customer over the phone who needs to connect a monitor that uses a digital interface. Which port should you instruct her to look for on the back of her PC?

DVI

What are two things that all digital devices need in order to work?

Data and a Computer Program

What are two objectives of ensuring data integrity?

Data is unaltered during transit and Data is not changed by unauthorized entities.

Which of the following features should you look for when selecting a vacuum cleaner for your cleaning kit?

Non-static generating and One that blows well as vacuums

Which technology creates a security token that allows a user to log in to a desired web application using credentials from a social media website?

Open Authorization

With artificial intelligence, smart devices can modify processes and settings on the fly in response to changes on the network.

True

Which component of Windows prompts the user for credentials or permission to minimize the dangers of unintended software installations?

User Account Control (UAC)

You are trying to help a co-worker order a UPS for each PC in her remote office location. What rating is used to specify the size of a UPS?

VA

Which of the following is most helpful in keeping a computer cool?

Vacuum dust from the system regularly and Verify that cooing fans are not circulating air in the wrong directions.

What are two security implementations that use bio-metrics?

Voice Recognition and Fingerprint

Which operation system(s) include the following features? Cortana Cloud Storage Continuum Microsoft Store Microsoft Edge

Windows 10

Which tool would you use to measure electrical properties such as voltage, amps, and resistance?

Multimeter

What are loopback plugs used for?

Testing ports by returning output signals as input.

What is the largest network in existence?

The Internet

Which of the following is the term used for a set of programs that acts as an interface between the applications that are running on a computer and the computer's hardware?

The operating system

A Help Desk technician receives a call from a user who is unable to download new messages from the company's email server. The technician tells the user to open a command prompt and ping the email server and check the SMTP and POP3 server IP address.

The technician used jargon that the user probably didn't understand.

Which of the following items are likely to be displayed in the Notification Area of a computer running the Windows operating system?

Time and Volume

What is one main function of the Cisco Security Incident Response Team?

To ensure company, system, and data preservation

Multitasking

Ability to run multiple applications simultaneously.

Multithreading

Ability to run multiple parts of an application simultaneously.

Multiprocessing

Ability to use multiple processing devices.

Fog computing

An architecture that utilizes edge devices for data pre-processing and storage

While on a service call at a customer site, you are discussing the problem with the customer when your cell phone rings. You check the caller ID, and you see that the call is related to parts you ordered for another customer.

Ask the customer if they mind if you take the call, and then step into the hallway to briefly talk on the phone.

A company is experiencing overwhelming visits to a main web server. The IT department is developing a plan to add a couple more web servers for load balancing and redundancy. Which requirement of information security is addressed by implementing the plan?

Availability

Distributed processing

Breaks large volumes of data into smaller pieces which are processed by computers in different locations

You have just installed a new USB card reader in your Windows computer. Every time you perform certain action using the card reader, you get an error message you you've never seen before.

Check the manufacturer's website for information about the error.

Which of the following are common tools used to physically clean the inside of a computer?

Compressed air and a Natural bristle brush

A web server administrator is configuring access settings to require users to authenticate first before accessing certain web pages. Which requirement of information security is addressed through the configuration?

Confidentiality

For what purpose would a network administrator use the Nmap tool?

Detection and identification of open ports

Which of the following MAC features is used to launch apps, switch between running apps, access the Trash, and also to access specific folders.

Dock

A user sends a print job to network printer and it prints page after page of random characters. He calls the Help Desk and a technician discovers that the wrong printer driver has been loaded on the user's workstation. The technician loads the correct driver, verifies that the system works correctly and documents the resolution.

Educate the user as to how the problem was resolved and verify that they are satisfied with the result.

A user asks you to perform a task that you do now know how to do and is not in the scope of your job duties. What is the best way to respond?

Explain to the user that this is not a task you can perform, but you will do your best to contact someone who can perform the task.

Which Windows tools would you use to browse the file system on a drive?

File Explorer, Windows Explorer, and Computer

Which two types of institutions do malicious web pages often look like?

Financial and Bank

While answering Help Desk calls, a field customer calls and complains that he cannot print to a work group laser printer.

Have you ever printed to that printer?

What tool is used to lure an attacker so that an administrator can capture, log, and analyze the behavior of the attack?

Honeypot

What are two requirements to connect a smart device to a home wireless network?

IP Addressing and the SSID

You are responsible for managing client workstations for your company. A frantic user calls you one morning exclaiming that "nothing is working."

Identify the problem

Which of the following is a myth regarding electrostatic discharge(ESD)?

If you can't feel ESD, the surge is not sufficient to harm computer components.

ESD is most likely to occur

In a cool, dry atmosphere

You need to find a file that you saved on your computer. You will have to search for it because you don't remember which directory it was saved in. Which Windows feature improves the speed of file searches on your computer?

Indexing Service

What is the best method to avoid getting spyware on a machine?

Install software only from trusted websites.

Which two tools used for incident detection can be used to detect anomalous behavior, to detect command and control traffic, and to detect infected hosts?

Intrusion detection system and NetFlow

What are three benefits of cloud computing?

It enables access to organizational data anywhere and at any time, It eliminates or reduces the need for onsite IT equipment, maintenance, and management, and It streamlines the IT operations of an organization by subscribing only to needed services.

Which statement describes cybersecurity?

It is an ongoing effort to protect Internet-connected systems and the data associated with those systems from unauthorized use or harm.

Which of the following is a benefit of good documentation?

It saves time and money in troubleshooting problems.

Which type of network consists of wired computers in a college classroom?

LAN

A printer is behaving erratically, and you suspect a faulty port. What tool can you use to test the parallel port?

Loop-back Plug

To prevent ESD when replacing internal components, you attach an anti-static wrist strap to your wrist. Where should the other end be fastened?

Metal area on the computer case and an Anti-static mat

Which type of network is the connection between a Bluetooth headset and a vehicle?

PAN

You are connecting an older, dot matrix printer to a computer. The printer's cable is a D-shaped connector with 25 pins. Which port type does the printer connect to?

Parallel port

A medical office employee sends emails to patients about recent patient visits to the facility. What information would put the privacy of the patients at risk if it was included in the email?

Patient Records

What is the best approach to prevent a compromised IoT device from maliciously accessing data and devices on a local network?

Place all IoT devices on an isolated network

What is an example of the a Cyber Kill Chain?

Planned process of cyberattack

Which of the following are considered computer hardware?

Printer and Motherboard

Which stage of the kill chain used by attackers focuses on the identification and selection of targets?

Reconnaissance

Which of the following are considered input devices?

Scanner, Keyboard, and Microphone

You are a PC technician for a company. You receive the following email from an employee: My email doesn't work. I keep getting email sent back to me, and I can't find any of my old emails. I don't think the email program has ever worked well. Whe you arrive at the employee's desk you observe how the employee accomplished normal email tasks. You quickly determine that the problem is not with the email program but that the employee needs to be trained on how to use the program. You have several high priority task that you need to accomplish by the end of the day. What is the BEST way for you to respond?

Set up an appointment to train the employee on how to complete common email tasks.

You are looking at a female TRS connector on the computer. Which device uses this connector?

Speaker

Hard drives are best stored in a

Static Shielding Bag

Which of the following will help reduce the threat of static discharge when working on computer hardware?

Store the unused components in static shielding bags and Remain in physical contact with the server chassis at all times.


Conjuntos de estudio relacionados

Exam: 7 Chapter 36,37,38,40,41. West Coast University.

View Set

Test 2 Study Guide Chapter 5 & 6

View Set

Learning to Read, Write, and Spell Words in English as a New Language

View Set

Skin Color and Subcutaneous Layer

View Set

Chap 7-Client's Response to Illness

View Set

Professional Nursing EAQ: Ch. 17- Nursing Diagnosis

View Set

childhood integumentary disorders

View Set