Cyber Security Quiz/Test
Which Windows Registry hive stores file extensions for applications?
HKEY_CLASSES_ROOT
To which part of the CIA triangle does "Encrypt a nonvolatile storage unit" apply?
Confidentiality
A server is in a physically secure part of a building which is protected by guards and fences. This layered approach of security, to where one does more than just password-protect the server, is part of___________
Defense-in-depth
Cyber security protection of an organization is the responsibility of...
Everyone in the Organization
Cyber criminals only target large companies. True or False?
False
BitLocker, when possible, stores the encryption key on a computer's _____
TPM
What should the department head do in order to be able to control permissions?
Take ownership of the folder
A junior administrator asks you what it means to harden a server. Which two statements fit the description of hardening a server?
Uninstall unnecessary features and disable unnecessary services
To change (something) by including the most recent information
Updates
Which of the following should you do to restrict access to your files and devices?
Use multi-factor authentication.
A secure form of Hypertext Transfer Protocol (HTTP) that is used to exchange information between webpages or access information found on a webpage.
https:
Which protocol should be allowed only on email servers used to send email and should be blocked on all other servers and clients machines?
SMTP
What are two typical DMZ configs used in perimeter networks?
Sandwich and Single firewall DMZ
In which ways can security templates be deployed?
Security Configuration and Analysis Snap-In and GPOs
Which tunneling protocol is used to carry packets from unroutable IP addresses across a routable IP network
GRE
Which type of VPN connection usually connects two business entities?
Site-to-site
Which of the following are advanced permissions in NTFS?
Take Ownership
Digital certificates are electronic documents that contain an identity as a user name or organization, along with ________
A public key
Cyber security should be viewed as a risk management problem because:
Absolute protection cannot be guaranteed.
Where, on a Windows Server, is a password reset for a domain user account
Active Directory Users and Computers
Which is the best answer for which people in a business should be responsible for cybersecurity?
All staff members should know some cybersecurity basics to reduce the risk of cyber attacks.
Having or showing realization, perception, or knowledge.
Awareness
Which two types of attacks are at least somewhat thwarted with the use of account lockout policy?
Brute Force and Dictionary Attacks
Measures were taken to protect a computer or computer system (as on the internet) against unauthorized access or attack.
Cybersecurity
Devices that store data digitally on non removable magnetic coated disks that are rotated underneath a read head.
Hard Disk Drive (HDD)
How can a wireless network best be set up to allow only specific devices onto the network?
MAC address filtering
software designed to infiltrate or damage a computer system without the user's normal functioning.
Malware
An attacker sets up a system that tricks the user's computer into thinking the attacker is the server, and tricks the server into thinking the attacker is the user's computer. What type of attack is this?
Man-in-the-middle attack
A secret series of numbers or letters that allows you to use a computer system.
Password
What does not represent two-factor authentication?
Password and PIN
A scam in which official-looking emails are sent to individuals in an attempt to get them to divulge private information such as passwords, usernames, and account numbers, which the scammers can use illicitly.
Phishing
Forms of electronic communication in which users create online communities and share information, including photos, videos, and messages, etc.
Social Media
computer software that secretly records information about the way you use your computer
Spyware
Which of the following is not considered a factor in determining cyber risk?
The Duration of the threat event
a type of malware that is often disguised as legitimate software.
Trojan
Backing up important files offline, on an external hard drive or in the cloud, will help protect your business in the event of a cyber attack. True or False?
True
a program that is designed to harm a computer by deleting data, ruining files, and that can spread secretly from on computer to another.
Virus
Which is not in the 5 types of cyber security?
Website Breaching
You can use IPSec Console to configure IPSec on a computer running Windows Server 2008:- Windows Firewall with Advanced Security- IPSec Security Tool- Windows Firewall with the IPSec plugin
Windows Firewall with Advanced Security
Which is Windows 10 authentications system that uses a user's face, iris, or fingerprint to unlock devices
Windows Hello