Cybersecurity Exam Study Guide
Which search strategy would likely retrieve the fewest results? "country music" +2010 music OR country OR 2010 country AND music OR 2010 "country music" music +country +2010
"country music" +2010
Which of the following represents an example of a special character? 0 & G s
&
What is the proper format for a single line comment in Karel? # This is a comment // This is a comment /* This is a comment This is a comment
// This is a comment
How many total times will Karel move in this program? function start () { move(); far (var i = 0; i < 5; i++) { move(); putBall(); } } 1 5 6 7
6
Which of the following devices is not a part of the Internet of Things? 1 A watch that allows you to measure and track your activity through a mobile app 2 A security system that lets you remotely monitor your home 3 A physical combination padlock for your gym locker 4 A car with a built-in navigation system
A physical combination padlock for your gym locker
There are a number of different cryptography methods that range in complexity, but it is always important to add a layer of encryption to your private data. Which of the following are ways to encrypt your own private data? A. Using strong passwords B. Setting up and using 2-factor authentication C. Only clicking on links that are sent through email D. Safe web browsing E. Using the same password for every site or app
A, B, and D
Which of the following people can access your digital footprint? A. Teachers, colleges, and scholarship committees B. Potential employers C. Family, friends, and acquaintances
A,B, and C
Anne Smith is creating a screen name for her video game account. To ensure personal safety, which is the best screen name choice of the following? Her information is as follows: Name: Anne Smith Birthday: 12/13/2001 Address: 465 Marbury Lane, Chicago, IL 60603 ASmith2001 AnnieSGamer121301 AnneS60603 ASGamer12 ASChicago01
ASGamer12
Which of the following security features is put into place to ensure correct authorization? Password policies Automatic updates Account permissions Multi-factor authentication
Account permissions
How can you be an upstander if you witness cyberbullying? Reach out to the victim-let them know that you care and encourage them to seek help Tell a teacher, parent, or counselor about the bullying Report bullying to the website admin All of the above
All of the above
Why do programmers indent their code? Helps show the structure of the code. Easier for other people to understand. A key part of good programming style! All of the above
All of the above
Why do we use functions in Karel programs? Break down our program into smaller parts Avoid repeating code Make our program more readable All of the above
All of the above
Which of the following is true of the WannaCry ransomware attack? 1 Hackers locked down computers and demanded payment to unlock 2 Medical services were disrupted as a result of the attack 3 The attack may have been possible because people had not updated their operating systems 4 All of the above are true
All of the above are true
Which of the following is LEAST likely to indicate a phishing attack? 1. An email from a website asks that you click on a link to reset your password. 2. An email from your bank asks you to call the number on your card to verify a transaction. 3. An email from your water utility company asks you to enter your date of birth and social security number for verification purposes. 4. An email indicates you have won money, and asks you to enter your bank account number so the money can be transferred
An email from your bank asks you to call the number on your card to verify a transaction.
What is an array (or list)? An unordered collection of unique items An ordered collection of items A collection of (key, value) pairs A collection of items stored at (row, column) locations
An ordered collection of items
An alert pops up on your screen informing you of a possible vulnerability in your system. Which security method is most likely responsible for sending this alert? Antivirus Software Data Backup Operating System Patch Software Update
Antivirus Software
Robert is on an online auction site trying to make a bid on a new computer. As he tries to make a bid, the site crashes and he loses the auction. Which part of the CIA triad was broken? 1. Confidentiality 2 Integrity 3 Availability 4 All of the above
Availability
Which of the following statements are true? A. There has been a decrease in the number of cyber attacks in the past decade. B. Cybersecurity is the protection of computer systems, networks, and data from digital attacks. C. Cyber attacks in the past few years have impacted individuals, governments, and organizations.
B and C
Which instances are considered illegal hacking? A. White hat hacking B. Hacktivism C. Penetration testing D. Bug bounty program E. Hacking just for fun
B and E
What should you do if you are a victim of cyberbullying? A. Respond to the bully B. Keep a record of messages received (print or take screenshots) C. Reach out to parents, teachers, counselors, and school administrators D. Block communication from the bully (if possible)
B, C, and D
Which of the following is not a good practice for effective Internet searches? Search for specific keywords that define your topic Use quotation marks to search for exact phrases Be general in your search query to get as many results possible Use + or - to include or exclude different topics
Be general in your search query to get as many results possible
Which of the following are saved even when in private browsing? Cookies Bookmarks Temporary Files Search Records
Bookmarks
Roland knew that the code to his sister's toy safe was only two digits long. He was able to crack the safe open by attempting every two-digit code until he found the correct one. What method of code-breaking did Roland use? Frequency analysis Brute force Frequency distribution Using a dictionary
Brute force
Which creative commons license is the least restrictive? CC BY (Attribution) CC BY-SA (Attribution-ShareAlike) CC BY-NC-ND (Attribution-NonCommercial-NoDerivs) CC BY-NC (Attribution-NonCommercial)
CC BY (Attribution)
You purchased a new smartphone that can accept a PIN of up to six characters. For maximum security, what should you do? Use a four character PIN because it's easier to remember. Change your PIN to a new six-character PIN. Repeat the last character of your old four-character PIN to create a new six-character PIN. Disable encryption.
Change your PIN to a new six-character PIN.
Your web browser is showing an outdated picture on a website that you visit often. Which of the following would be the best choice for attempting to fix this issue? Clear cache. Install an add-on. Remove an extension. Disable client-side scripting.
Clear Cache
In a three-tier application architecture example, which device runs the presentation layer? Application server Client computer Cloud server File server
Client Computer
You notice that your browser is running a bit slow. Which of the following settings could be changed in order to increase your browsing speed? Cache is enabled. Pop ups are disabled. Proxy settings are used. Client-side scripting is disabled.
Client side scripting is disabled
Alice is checking her grades on a school computer in the library, and she forgets to log out before she leaves. Bob gets on the computer after her, and he sees her grades for all of her classes. Which part of the CIA triad was broken? 1 Confidentiality 2 Integrity 3 Availability 4 All of the above
Confidentiality
Encrypted information is only viewable by authorized users who have the correct key to decrypt. This describes which aspect of the CIA triad? Integrity Confidentiality Availability Collisions
Confidentiality
Sarah puts a lock on her diary so only she can read it. Her little brother breaks the lock and reads her diary. Which part of the CIA triad was broken? 1 Confidentiality 2 Integrity 3 Availability 4 All of the above
Confidentiality
Which of the following statements is true about creative credit and copyright? 1. There are exactly two copyright licenses. One allows free use of the content, and the other only allows use of the content with payment and credit to the creator. 2. As long as you give credit, you can use any content found online. 3. Copyright licenses range in how restrictive they are for reuse and modification of content. 4. An individual doesn't own the content they create unless they apply for a copyright license. Answered
Copyright licenses range in how restrictive they are for reuse and modification of content.
You have downloaded a program that can be run on Windows or on macOS. What term is used to describe this type of software? Cross-platform Open source Proprietary Site licensed Single-platform
Cross platform
How can we teach Karel new commands? For loop While loop Define a new function The start function
Define a new function
What does a ransomware hacker do when they gain access to a user's system? Encrypt important files Delete key system data Copy a users personal data Move operating system data
Encrypt important files
What should be the primary focus of keeping information secure? 1 Educating users on the dangers of phishing attempts 2 Encrypting all personal data 3 Ensuring the confidentiality, integrity, and availability of data 4 Implementing a strong password policy
Ensuring the confidentiality, integrity, and availability of data
Which file system would be the best choice to use in a drive that will be used with both Windows 10 and macOS? Ext4 FAT32 HFS NTFS
FAT32
True or False: As long as you cite your source, you are free to use or share any kind of media you find on the Internet.
False
True or False? You can strengthen the encryption of a Caesar cipher by shifting the letters twice (using two keys).
False
By checking the box on a privacy policy page, a company can legally use your data and information in all the ways disclosed, even if you change your settings. True. This is always the case. True. Changing your settings does not affect the privacy policy. False. It depends if the privacy policy allows you to opt in or out of sharing data. False. Companies do not give you the option to update your settings.
False. It depends if the privacy policy allows you to opt in or out of sharing data.
Which of the following pieces of information would be safe to include in an online username? School mascot Favorite sport Year of birth City of residence
Favorite sport
What is the main fear that ransomware attacks center around? Fear of hackers Fear of the Internet Fear of being spied on Fear of losing important files
Fear of losing important files
Say you want to write a program to have Karel put down 300 tennis balls. Which control structure would you use? If statement While loop For loop Nested while loop
For loop
What is the resulting ciphertext when the word DAN is encrypted using the Caeser cipher along with the key of 3? BYL AXK GDQ XWJ
GDQ
Which of the following are characteristics of a credible source online? I. The domain is .edu or .gov II. Multiple scholarly sources are cited III. The author is anonymous IV. The site has multiple spelling errors
I and II
What should you do if somebody at your school is bullying your friend on a social media website? I. Reach out to your friend being bullied, letting them know that you care II. Start an online petition to get the bully kicked out of school III. Report the bullying to the website admin IV. Avoid telling adults about the incidents to avoid escalation
I and III
Blake logs into the website for his math class and realizes that he has access to the upcoming midterm exam—even though his teacher said the exam questions would not be released until the day of the exam. Which part of the CIA Triad has been compromised? I. Confidentiality II. Integrity III. Availability
I only
Which of the following actions can help you maintain your digital footprint? I. Using privacy settings to limit the audience of your posts II. Reviewing posts you are tagged in III. Googling yourself on a regular basis IV. Posting long rants when you are angry about school or work
I, II and III
Which of the following are best practices for keeping secure passwords? I. Create passwords that are long in length II. Use the same password for multiple accounts III. Use a password manager IV. Don't use personal information like your name or birthdate in your passwords
I, III, and IV
Which of the following statements are true about the Internet? I - The Internet connects devices and networks all over the world II - There are no negative consequences of the Internet, it is purely positive III - The Internet helps people communicate IV - The Internet helps people collaborate to solve problems
I, III, and IV
Which of the following shows the word "DOG" encrypted with the Caesar cipher with a key of 5? IPH CAT FQI ITL
ITL
Cynthia discovers that she has the ability to modify the lunch menu posted on her school's website. She edits the website so for lunch every day, it says "Green Eggs and Ham". Which part of the CIA triad was broken? 1. Confidentiality 2. Integrity 3. Availability 4. All of the above
Integrity
Which aspect of the CIA triad ensures that data is protected from unauthorized or unintentional alteration? 1. Confidentiality 2. Integrity 3. Availability 4. The CIA Triad is unrelated to data security issues
Integrity
Spear-phishing is when hackers search for and use personal data to directly target a person in a phishing email. Of the following, which would provide the most credibility in a spear-phishing email? Knowing your full name Knowing your hobbies Knowing a recent store that you shopped at Knowing your address
Knowing a recent store that you shopped at
Laura will go to her friend's house if she has less than two hours of homework or if it is the weekend. Otherwise, she will stay home and study. In which of the following cases will Laura stay home to study? 1. Laura has 1.5 hours of homework on Tuesday 2. Laura has 4 hour of homework on Saturday 3. Laura has 2.5 hours of homework on Thursday 4. Laura has 1 hour of homework on Saturday
Laura has 2.5 hours of homework on Thursday
During an internship, a client requests that her database application be moved to a separate network drive. What kind of architecture is this an example of? N-tier Wireless Cloud-hosted Local Network Hosted
Local Network Hosted
Which of the following file types would enable an audio file to work on both Windows and macOS? AIFF DOCX MP3 WMA
MP3
What is the ciphertext that results from encrypting the word LET using the Vigenere cipher along with the keyword, CAB? MFU JES NGV NEU
NEU
A locally installed application is an example of which application architecture? N-tier One tier Two tier Three tier
One Tier
You'd like to add features to a calendar app with the permission of the vendor without paying any licensing fees. What type of license is required to be able to do this? Free Open source Site license Subscription
Open Source
You have asked your users to avoid using passwords that use letters only. Which of the following policies would help enforce this? Password complexity requirements Enforce password history Minimum password length Maximum password age.
Password complexity requirements
It's time to change passwords again and you don't feel like entering a brand-new password. You use an old password you used last year, but it is rejected. What policy is most likely preventing you from reusing it? Password complexity Password history Password expiration Maximum attempts
Password history
Which website citation can be most trusted as a reliable and credible source? Patel, Jonathan. Why HTML Frameworks are Not Good. Web Development Today, 28 Nov. 2019, www.webdevelopmenttoday.com. Accessed 10 May 2020. Patel, Jonathan. Advantages and Disadvantages of HTML Frameworks. Web Development Today, 28 Nov. 2019, www.webdevelopmenttoday.edu. Accessed 10 May 2020. Patel, Jonathan. Advantages and Disadvantages of HTML Frameworks. Web Development Today, 28 Nov. 2003, www.webdevelopmenttoday.edu. Accessed 10 May 2020. Patel, Jonathan. HTML Frameworks are Amazing! Web Development Today, 28 Nov. 2019, www.webdevelopmenttoday.edu. Accessed 10 May 2020.
Patel, Jonathan. Advantages and Disadvantages of HTML Frameworks. Web Development Today, 28 Nov. 2019, www.webdevelopmenttoday.edu. Accessed 10 May 2020.
A person's digital footprint is: Public, but not usually permanent Only public to people whom a person shares things with, but what's there is permanent Public and permanent to anyone
Public and permanent to anyone
Which of the following activities poses the greatest personal cybersecurity risk? 1. Making a purchase on an online store that uses public key encryption to transmit information 2. Paying a bill using a secure online electronic payment system 3. Purchasing a couch by emailing a credit card number to the couch owner 4. Checking a bank account on a bank's website that uses HTTPS for secure communication
Purchasing a couch by emailing a credit card number to the couch owner
Your friend is on a Windows computer and is unable to open and view the file that you created in the Pages application on your Mac. Which is the best option to ensure that he can correctly view your file? (Note: Your friend does not need to edit the file.) Copy the text from the file and email to your friend. Take a picture of the file and send the picture to your friend. Save the Pages file as a pdf and send the pdf file to your friend. Retype the document into an application that is compatible with both Windows and Macs.
Save the Pages file as a pdf and send the pdf file to your friend.
Which of the following is considered an unethical use of computer resources? 1. Downloading file sharing software on your home computer 2. Searching online for the answers to CodeHS exercises and quizzes 3. Purchasing an app from an app store and downloading it directly to a mobile device 4. Searching online for an electronic version of a textbook
Searching online for the answers to CodeHS exercises and quizzes
Which statement is true about cross-platform software? It must be open source. Some features might vary. It will work the same on every platform. Some versions will work only in a cloud-based environment.
Some features might vary
What is the term used in cryptography when the same key is used to encrypt and decrypt the data? Asymmetric Encryption Substitution Cipher Reflexive Encryption Symmetric Encryption
Symmetric Encryption
Which set of letters spells a valid word when decrypted using the Caesar cipher with a key of 2? HJG TWP XPY PLC
TWP
Which statement is true about the Vigenère cipher? The Vigenère cipher uses complex mathematical algorithms to encrypt messages. You can use letter frequency analysis to crack a message encrypted with a Vigenère cipher. The Vigenère cipher is easier to crack than the Caesar cipher. The Vigenère cipher utilizes more than one shift value dependent on a keyword.
The Vigenère cipher utilizes more than one shift value dependent on a keyword.
Which of the following is not a characteristic of a credible source? The author is not named on the website The domain is .edu or .gov Multiple scholarly sources are cited The source is well-organized and follows rules of spelling and grammar
The author is not named on the website
What's wrong with this code? function start () { move(); go(); go(); } function go() { move(); move(); } function go() { move(); move(); } The go function is called twice The go function has a syntax error The go function has been defined twice go is not a command that Karel understands
The go function has been defined twice
What makes the following command an invalid Karel command? turnleft(); It should end in a colon rather than a semicolon The l should be a capital L It should start with a capital T This command is correct
The l should be a capital L
What is the Internet of Things? 1. The network of devices with the ability to connect and exchange data 2. A mechanism to increase network of security by involving every connected device in the protection of a network 3. A term created to describe the impact that increased connectivity has on data security 4. Social and economic inequality related to access to and use of the Internet-connected devices
The network of devices with the ability to connect and exchange data
Which of the following most accurately describes the Internet of Things? 1. Malicious hackers intent on stealing confidential information like credit card numbers or email addresses 2. All of the websites that a person can currently access online 3. Internet service providers who make it possible to go online 4. The network of devices with the ability to connect and exchange data
The network of devices with the ability to connect and exchange data
Which of the following would pose the greatest threat to a user's personal privacy if it were to be leaked to the public? 1. The IP address of the user's computer 2. The user's browser cookies 3. The user's email address 4. The user's public key used for encryption
The user's browser cookies
What is not true of white hat hackers? They contribute to robust security systems They use the same methods as black hat hackers They alert companies of security vulnerabilities They are breaking the law and are at risk of legal repercussions
They are breaking the law and are at risk of legal repercussions
In the following code below from the Cleanup Karel example, what is the purpose of If Statement #2? // This program has Karel walk down the // row and clean up all of the tennis balls // on the way function start() { while (frontis Clear()) { // If statement #1 if (ballsPresent()) { takeBall(); } move(); } // If statement #2 if (ballsPresent()) { takeBall(); } } To move the last time To pick up the ball that is in the last spot To pick up the ball that is in the last spot, if there is one To take the ball from all of the positions that have a ball on them
To pick up the ball that is in the last spot, if there is one
What is the purpose of using a for loop in code? To do something if a condition is true To do something while a condition is true To repeat something a fixed number of times To make programs run faster
To repeat something a fixed number of times
You are purchasing a birthday gift for your sister. You both share a computer. How can you hide your searches? Clear cache. Turn on proxy settings. Use private browsing. Refuse security certificates.
Use Private browsing
How can we improve the following program? function () { move(); move(); move(); move(); move(); move() move(); } Break down this program into more functions Use a for loop to repeat the move command Use a while loop to repeat the move command Fix the indentation of this program
Use a for loop to repeat the move command
Marsha found her sister's diary that listed all of her passwords. However, it wasn't listed for which site the passwords were used. She tried each password listed until she was able to log into her sister's computer. What method of code-breaking did Marsha use? Frequency analysis Brute force Frequency distribution Using a dictionary
Using a dictionary
Your system is a 32-bit Windows system. You have installed a 64-bit version of a driver file. What will happen? Windows will update the driver. Windows cannot use the driver. Windows will be able to run the driver as is. Windows will run the driver in a compatibility mode.
Windows cannot use the driver.
You find an image with the copyright license shown. Which action is permitted? ( CC - BY - xNC) You can use the image for commercial purposes if you credit the owner. You can use the image without crediting the owner. You can use and modify the image for non-commercial purposes if you credit the owner. You can modify and use the image without crediting the owner.
You can use and modify the image for non-commercial purposes if you credit the owner.
You are using the terminal to move through your computer's folders. You'd like to get into the Cybersecurity folder. You type in pwd and find that your current folder path is ~/Users/student/Documents/Cybersecurity/Images. Which of the following commands will place you inside the Cybersecurity folder? cd .. mv .. cd Cybersecurity mv Cybersecurity
cd ..
What is the term used in cryptography for the message after encryption? algorithm ciphertext key plaintext
ciphertext
Which of the following is the correct way to define a turnRight function in Karel? function turnRight() { turnLeft(); turnLeft(); turnLeft(); } function turnRight() { turnRight(); turnRight(); turnRight(); } function turnRight { turnLeft(); turnLeft(); turnLeft(); } turnRight function() { turnLeft(); turnLeft(); turnLeft(); }
function turnRight() { turnLeft(); turnLeft(); turnLeft(); }
In the following array: var groceries = ["milk", "eggs", "cookies", "cake"]; Which of the following statements will change "cookies" to "bread"? groceries["cookies"] = "bread"; groceries[3] = "bread"; groceries[2] = "bread"; groceries.push("bread");
groceries[2] = "bread";
A deceptive email is typically used in a phishing attack. Which of the following is most likely a legitimate email address? [email protected] [email protected] [email protected] [email protected]
Your computer crashed! Your data was not corrupted due to which feature of your NTFS system drive? compression encryption journaling permissions
journaling
Using the Caesar cipher, "HELLO" is encrypted to "OLSSV" by applying a shift of 7. The number 7 is considered the __________. algorithm ciphertext key plaintext
key
What is the core technology that allows digital devices to connect and transmit data with each other? sensors networks smart phones a global positioning sensor or GPS
networks
Using the Caesar cipher, "HELLO" is encrypted to "OLSSV" by applying a shift of 7. The message "HELLO" is considered the __________. algorithm ciphertext key plaintext
plaintext
You've been asked to filter and block certain sites for your younger sister. Which of the following can be used to filter which sites are allowed through to the browser? cache client-side scripting private browsing mode proxy settings
proxy settings
Your computer is running slowly and you believe it is because of a program that is running in the background. Which terminal command will allow you to see all of the running programs and applications on your computer? dir kill ls ps
ps
An encryption method that uses a series of interwoven Caesar ciphers based on the letters of a keyword is called: hashing the Vigenère Cipher the symmetric key public key encryption
the Vigenère Cipher
What is comprised of millions of smart devices and sensors connected to the internet? the cloud the data center the internet of things the CIA triad
the internet of things
A store has 20 apples in its inventory. How can you store this information in a JavaScript variable? Var numApples == 20; 20 = numApples; var numApples = 20; var num apples = 20;
var numApples = 20;
If x represents the area of the number line colored yellow, which inequality accurately reflects the value of x? 1. x < 5 2. x > 5 3. x ≥ 5 4. x ≤ 5
x > 5