cyber security test

¡Supera tus tareas y exámenes ahora con Quizwiz!

When describing malware, what is a difference between a virus and a worm?

A virus replicates itself by attaching to another file, whereas a worm can replicate itself independently

What type of attack uses zombies?

DDoS

What are two objectives of ensuring data integrity?

Data is unaltered during transit. Data is not changed by unauthorized entities.

What is the best method to avoid getting spyware on a machine?

Install software only from trusted websites.

What is cyber security

It is an ongoing effort to protect Internet-connected systems and the data associated with those systems from unauthorized use or harm

What is the best approach to prevent a compromised IoT device from maliciously accessing data and devices on a local network?

Place all IoT devices that have access to the Internet on an isolated network

What is an example of the a Cyber Kill Chain?

a planned process of cyberattack

A web server administrator is configuring access settings to require users to authenticate first before accessing certain web pages. Which requirement of information security is addressed through the configuration?

confidentiality

What action will an IDS take upon detection of malicious traffic?

create a network alert and log the detection

For what purpose would a network administrator use the Nmap tool?

detection and identification of open ports

What tool can an administrator use to capture, log, and analyze the behavior of the attack?

honeypot

Which two tools used for incident detection can be used to detect anomalous behavior, to detect command and control traffic, and to detect infected hosts?

intrusion detection system NetFlow

Which technology creates a security token that allows a user to log in to a desired web application using credentials from a social media website?

open authorization

Which stage of the kill chain used by attackers focuses on the identification and selection of targets?

reconnaissance

What is one main function of the Cisco Security Incident Response Team?

to ensure company, system, and data preservation

Purpose of cyberwarfare

to gain advantage over adversaries

What are two security implementations that use biometrics?

voice recognition fingerprint


Conjuntos de estudio relacionados

Personal Finance Ch 1-4 Quiz Review For Exam 1 UCO

View Set

Unit 2, challenge 1, 2, 3: What is Sociology

View Set

Chapter 14 Gene Regulation in Bacteria

View Set

Chapter 7 Trust Justice & Ethics

View Set

micro chapter 10, mirco chapter 11, micro chapter 12

View Set