Cybersecurity Level 2 Study Guide
What age group is currently experiencing the most growth in terms of social media use? - 34-40 - 50 and over - 18-25 - 12 and under
50 and over
What age group is currently experiencing the most growth in terms of social media use? - 50 and over - 12 and under - 18-25 - 34-40
50 and over
What percentage of U.S. job recruiters have rejected candidates based on their online reputation. - 50 - 40 - 80 - 70
70
What is the character associated with the binary number 100 0000? - @ - # - $ - &
@
Complete the statement with a choice below: Improved performance is achieved, because on a segmented network there are fewer hosts per sub-network, thus minimizing local ______________-. - traffic - phishing - congestion - privacy laws
traffic
Which type of threat consists of mostly inexperienced individuals using easily available hacking tools such as shell scripts and password crackers? - unstructured threats - structured threats - external threats - internal threats
unstructured threats
Select the missing word: Segmenting allows ________________ access to the network to be controlled by implementing VLANs to segregate the network. - visitor - clients - no one - hosts
visitor
Match the type of topology with it's correct definition. - when a node is seen by another node as if it is connected directly. There might be some intermediate devices but each node on either side is unaware of intermediate layers. - Peer to peer - when there is a single and a common communication channel on which all nodes are connected with terminators on both ends to absorb signals. - Bus - the arrangement of nodes where there is a central node from which all other nodes are connected. - Star - the sequence of all nodes connected, one gets connection from the preceding node and the first node is the last node which makes a cycle . - Ring - the arrangement of nodes based on levels or layers. There is always one node at the button of the network (root node), below this level is another level of nodes (which all share the same parent), and below each of those nodes are other nodes. At each level, there is one root node when combined with its children they form a star topology. - Tree - the arrangement of nodes in such a way that each node in the network is connected to the rest of the other nodes. - Mesh - the implementation of two or more topologies together to form a network. - Hybrid
when a node is seen by another node as if it is connected directly. There might be some intermediate devices but each node on either side is unaware of intermediate layers. - Peer to peer - when there is a single and a common communication channel on which all nodes are connected with terminators on both ends to absorb signals. - Bus - the arrangement of nodes where there is a central node from which all other nodes are connected. - Star - the sequence of all nodes connected, one gets connection from the preceding node and the first node is the last node which makes a cycle . - Ring - the arrangement of nodes based on levels or layers. There is always one node at the button of the network (root node), below this level is another level of nodes (which all share the same parent), and below each of those nodes are other nodes. At each level, there is one root node when combined with its children they form a star topology. - Tree - the arrangement of nodes in such a way that each node in the network is connected to the rest of the other nodes. - Mesh - the implementation of two or more topologies together to form a network. - Hybrid
Cyber-vetting can be defined as.... - where interviewers cannot research applicants based on their online activities - where interviewers could research applicants based on their online activities - where applicants cannot research prospective employers based on their online activities. - where applicants could research prospective employers based on their online activities.
where interviewers could research applicants based on their online activities
A type of website that can be created collaboratively or modified by different users is called a __________________. - wiki - podcast - forum - blog
wiki
Networks that do not need a physical communication link are called ____________ networks - wireless - wired - PAN - confidential
wireless
Match each of the following binary numbers with its decimal equivalent. - 0101 1010 - 90 - 0101 0101 - 85 - 1010 1010 - 170
0101 1010 - 90 0101 0101 - 85 1010 1010 - 170 (SKIP !!)
Match each of the following decimal numbers with its binary equivalent. - 15 - 0000 1111 - 45 - 0010 1101 - 131 - 1000 0011
15 - 0000 1111 45 - 0010 1101 131 - 1000 0011 (SKIP BECAUSE TEST MAY HAVE DIFFERENT NUMBERS.)
People have been using social media to communicate since the __________ . - 1930's - 1970's - 1990's - 2000's
1970's
In what year was the "World Wide Web" born? - 1990 - 1989 - 1994 - 1991
1990
In what year was the "World Wide Web" born? - 1994 - 1990 - 1991 - 1989
1990
Which of the following technological advancements was HP's first computer? - 2116A - 2252B - Mark 1 - Univac 1
2116A
How many blogs are on Tumblr? - 217,000,000,000 - 217,000 - 217,000,000 - 2,170
217,000,000
Match each of the following decimal numbers with its binary equivalent. - 3 - 0000 0011 - 240 - 1111 0000 - 55 - 0011 0111
3 - 0000 0011 240 - 1111 0000 55 - 0011 0111 (SKIP LOL)
What percent of college admissions officers found something online that had a negative impact on their evaluation of a student? - 38 - 50 - 48 - 25
38
The MAC addresses of wireless clients can't truly be changed because they're encoded in the hardware. - True - False
True
Match the common Protocol with the layer it coincides with. - Transport Layer - TCP - Internet Layer - IP(IPv4, IPv6) - Link Layer - ARP - Application Layer - DNS - Application Layer - SMTP
- Transport Layer - TCP - Internet Layer - IP(IPv4, IPv6) - Link Layer - ARP - Application Layer - DNS - Application Layer - SMTP
Please match the vocabulary word with the corresponding definition. - full-fledged production systems. The activities of the attacker are monitored by using a bug tap that has been installed on the honeypot's link to the network. - pure honeypots - imitate the activities of the production systems that host a variety of services and, therefore, an attacker may be allowed a lot of services to waste their time. - high-interaction honeypots - simulate only the services frequently requested by attackers. Since they consume relatively few resources, multiple virtual machines can easily be hosted on one physical system. - low-interaction honeypots
- full-fledged production systems. The activities of the attacker are monitored by using a bug tap that has been installed on the honeypot's link to the network. - pure honeypots - imitate the activities of the production systems that host a variety of services and, therefore, an attacker may be allowed a lot of services to waste their time. - high-interaction honeypots - simulate only the services frequently requested by attackers. Since they consume relatively few resources, multiple virtual machines can easily be hosted on one physical system. - low-interaction honeypots
Which bank in the UK is thought to be the first to put an Automated Teller Machine (ATM) into operation? - Barclay's Bank - Capital One Bank - J.P. Morgan - The Federal Reserve
Barclay's Bank
Which bank in the UK is thought to be the first to put an Automated Teller Machine (ATM) into operation? - J.P. Morgan - Barclay's Bank - Capital One Bank - The Federal Reserve
Barclay's Bank
A way for individuals to share information and express opinions about any number of subjects online is a social media platform called a __________. - Blog - Facebook - Twitter - Forum
Blog (???)
Match the social media network with the type of social media platform it is.
Blog - Tumblr Video - YouTube Photo Sharing - Instagram
The biggest future threat to information security in the future may be the lack of skilled and educated professionals in the industry. - True - False
True
Which protocol dynamically assign unique IP addresses to every machine connected to a network and ensures no IP conflict? - DHCP - IP - ARP - HTTP
DHCP
Which protocol dynamically assigns unique IP addresses to every machine connected to a network and ensures no IP conflict? - DHCP - IP - ARP - HTTP
DHCP
In 1952, the UNIVAC correctly predicted the outcome of the presidential election while selecting which man as the new President? - Adlai Stevenson - Dwight D. Eisenhower - Harry S. Truman - Ronald Reagan
Dwight D. Eisenhower
Which of the following is NOT a type of social media? - Blogs - Podcasts - Forums - Email
The unicodes will not only include _________________ symbols, but also symbols found in other languages. - English - French - British - Latin
English
What is the most popular social media platform on the web today? - Facebook - Linkedln - Pinterest - Twitter
A web server is a computer that provides World Wide Web (WWW) services on only the ring topology. It includes the hardware, operating system, Web server software, and Web site content (Web pages). If the Web server is used internally and not by the public, it may be known as an "intranet server". - True - False
False
By definition, forums are open to only select members. - True - False
False
IP address assignments are always on a static basis. - True - False
False
Individual privacy may be more protected as governments and law enforcement agencies aggressively monitor email and personal communication. - True - False
False
Most networks are dominated by Ethernet and/or Web Server protocol. - True - False
False
The first widespread social media platform was? - Friendster - MySpace - Facebook - Twitter
Friendster
This toy caused a 1998 holiday buying frenzy due to its communication with other toys like it using an infrared port between its eyes. - Furby - Tickle Me Elmo - Nintendo Gameboy - Nintendo Switch
Furby
This toy caused a 1998 holiday buying frenzy due to its communication with other toys like it using an infrared port between its eyes. - Furby - Tickle Me Elmo - Nintendo Switch - Nintendo Gameboy
Furby
This scientist built the "Model K" Adder on his kitchen table. It provided proof of concept for applying Boolean logic to the design of computers. - Ted Kaczynski - Alan Turing - George Stibitz - Konrad Zuse
George Stibitz
Which of the following technological advancements, built by Westinghouse, responded to voice commands and had pre-recorded wisecracks on 78 rpm records? - the Elektro - the Z3 computer - the Interpolator - the Colossus
the Elektro
Which social media platform is considered a business version of Facebook? - LinkedIn - Google+ - Pinterest - Twitter
Which social media platform is considered a business version of facebook? - LinkedIn - Google+ - Pinterest - Twitter
In the early 1980s a group of six teenagers were arrested for hacking into 60 different computer networks and were nicknamed the ...................... - Milwaukee 414s - Milwaukee Fonzis - Milwaukee 501s - Milwaukee Computer Kids (MCKs)
Milwaukee 414s
In 1992, Apple launched the first hand held "Personal Data Assistant" and named it after this famous scientist. - Newton - Pascal - Gates - Suzuki
Newton
Which technological advancement, whose debut, was the first electronic duplication of the human vocal tract on a single integrated circuit? - Speak & Spell - Elektro - Macintosh - Nintendo
Speak & Spell
Which of these is not a way to protect your digital reputation? - Search yourself — type your name into a search engine and see what comes up. If youterm-1 find things that you thought were private, check your privacy settings. - Stop and think about any content before you post or send. - Treat others online as you would like to be treated. - Highlight attractive traits and qualities.
Search yourself — type your name into a search engine and see what comes up. If you find things that you thought were private, check your privacy settings.
Which of the following technological advancements was the center of a patent dispute and created at Iowa State College(now University)? - The Atanasoff-Berry Computer (ABC) - the Elektro - the Model K Adder - the Complex Number Calculator
The Atanasoff-Berry Computer (ABC)
The DNS(Domain Name Service) act as translators for us. - True - False
True
A buffer is a dedicated portion of the printer's memory where information is held before being processed. - True - False
True
A web browser is client software used to view Web content. - True - False
True
Apple's inspiration for the Lisa and Macintosh computers came from the Xerox Alto. - True - False
True
Digital footprints are used by marketers in order to find what products a user is interested in or to inspire ones' interest in a certain product based on similar interests. - True - False
True
Networks that use a physical communication link such as fiber optic cables are called wired networks. - True - False
True
Segmenting limits the effect of local failures on other parts of the network. - True - False
True
Social media is a useful tool for job-seekers. - True - False
True
Taking steps to increase personal data security, limiting data exposure and sharing information about online threats is one-way personal information security has evolved. - True - False
True
Which U. S. military branch research group developed the first modem? - U. S. Navy - U. S. Air Force - U. S. Army - U. S. Marines
U. S. Air Force
A _________________ creates a secure connection between two networks over the internet. - VPN - IPSec - OpenSSL - DMZ
VPN
A computer program or a device that provides functionality for other programs or devices is referred to as.... - a server. - a client. - a node. - a web browser.
a server.
The definition of client is ...... - a system entity, usually a computer process acting on behalf of a human user, that makes use of a service provided by a server. - a computer program or a device that provides functionality for other programs or devices. - a network that use a physical communication link such as fiber optic cables. - a network that use no physical connections between the nodes.
a system entity, usually a computer process acting on behalf of a human user, that makes use of a service provided by a server.
This term is created when personal data is released deliberately by the user for the purpose of sharing information about oneself by means of websites or social media. - passive digital footprint - cyber-vetting - digital footprint - active digital footprint
active digital footprint
Which of these is NOT a use for packet or protocol analyzers? - allowing network problems to be dealt with by the anti-virus software installed on the machine - isolating network problems - debugging network protocol - detecting network misuse by internal and external users
allowing network problems to be dealt with by the anti-virus software installed on the machine
A digital dossier is ...... - an accumulation of all the digital tracks you leave behind. - an accumulation of only the active digital footprint you leave behind. - an accumulation of only the passive digital foot print you leave behind. - an accumulation of the photos you place on various social media platforms.
an accumulation of all the digital tracks you leave behind.
Which of the following has not been attributed, at least in part, to social media? - depression - drug addiction - kidnapping - murder
drug addiction
The definition, a method of routing in networks that is based on hierarchical addressing refers to which term? - hierarchical routing - hierarchical networking - hierarchical servers - hierarchical queries
hierarchical routing
Complete the statement with a choice below: By creating network segments containing only the resources specific to the consumers that you authorize access to, you are creating an environment of ___________ privilege. - least - most - equal - unequal
least
Podcasts are a type of social media that is experienced primarily through.... - listening - reading - watching - podcasts are not considered social media
listening
What portion of companies use social media to locate new employees? - nearly all - about 1/3 - about 1/2 - about 2/3
nearly all
Any device (for example, computer, printer, server) connected to a network, either as an endpoint (that is, a point where the communication link terminates) or some intermediary point (that is, a point which lies between endpoints on a communication link) is called a _________________. - node - wireless network - server - client
node
On what level has social media connected us to one another? - on a global level - on a national level - on a state level - on a community level
on a global level
Data collected without the user knowing is referred to as one's .... - passive digital footprint - digital footprint - active digital footprint - cyber-vetting
passive digital footprint
While digital footprint can be used to infer personal information, such as demographic traits, sexual orientation, race, religious and political views, personality, or intelligence without individuals' knowledge, it also exposes individuals' private _____________________ sphere into the social sphere. - emotional - spiritual - physical - psychological
psychological
The two most basic methods to design a network with a DMZ, are with a _______________ firewall or with _______________ firewalls. Choose two answers. - single - dual - double - isolated - sensitive
single dual
What determines how much data traffic a router can handle? - size - age - brand - location
size
What determines how much data traffic a router can handle? - size - brand - age - color
size
Any online conduit for communicating with companions or associates is referred to as _______________________ . - social media - forums - social engineering - blogs
social media
Websites or apps that allow you to communicate and share information are known as .... - social media networks - blogs - forums - wikis
social media networks
Installing a ________________ in between your firewall and network allows you to install a dedicated IDS, which protects your devices and allows them to continue working at full speed. - switch - malware detector - honeypot - intrusion detection system
switch
In a recursive name query, ...... - the DNS client requires that the DNS server responds to the client with either the requested resource record or an error message stating that the record or domain name does not exist. - a DNS client allows the DNS server to return the best answer it can give based on its cache or zone data - it is referred to as a method of routing in networks that is based on hierarchical addressing.. - the arrangement of nodes are based on levels or layers. There is always one node at the button of the network (root node), below this level is another level of nodes (which all share the same parent), and below each of those nodes are other nodes. At each level, there is one root node when combined with its children they form a star topology.
the DNS client requires that the DNS server responds to the client with either the requested resource record or an error message stating that the record or domain name does not exist.
Which of the following technological advancements, built by Westinghouse, responded to voice commands and had pre-recorded wisecracks on 78 rpm records? - the Colossus - the Elektro - the Z3 computer - the Interpolator
the Elektro