Computer Networks/Cyber Security 330
What is the "RS" function in the National Institute of Standards Technology (NIST) Cybersecurity Framework?
respond function
When a user has determined their destination, GIS can assist in providing directions. This is called
route information
List disadvantages of cloud computing. More than one answer may be correct.
security risks, limited control, and downtime
Which statement best explains why rootkits can be difficult to detect?
Rootkits are installed on a computer without the user's knowledge.
While bitcoin is one of the most well-known cryptocurrencies, there are others. Which of the following are popular cryptocurrencies? More than one answer may be selected.
Etherium and litecoin
How does a Network Address Translation (NAT) type of firewall work?
It hides internal IP addresses.
As reported by Andrei Ene, one of the worst malware attacks in the last 10 years is the TBT, or
Tiny Banker Trojan.
Which of the following are considered major cloud service providers?
cloud services security
The key feature of Web 2.0 that allows users to collectively classify information, such as by tagging websites and online images, is called
folksonomy
Recently, TechJury compiled a list of cybersecurity statistics that show the impact of different malware and network attacks. What percentage of cyberattacks are aimed at small businesses?
43%
Most organizations require employees to login in to view files that are posted to a shared drive, allowing different access to the files based on employee position within the organization and preventing unauthorized employees or other people from accessing all files. This is an example of which of the following tools that ensure confidentiality? More than one answer may be correct.
Authentication, encryption, access control
Alyssa says that no one would risk selling operable or effective malware programs, even on the Dark Web. Why is she wrong?
Criminal hackers do make money by selling actual malware.
What is the second step in the process of sending a message via the Internet?
Identify the correct domain name.
Which of the following statements about blockchain are true? More than one answer may be selected.
In blockchain, the previous hash links two blocks together, which prevents anyone from inserting a block where one should not be and At its inception, members of a newly created blockchain network must agree to the rules and guidelines that will govern their blockchain.
Which of these statements about packet sniffers are true? More than one answer may be correct.
Legitimate sniffers are used for routine examination and problem detection. Unauthorized sniffers are used to steal information.
What methods are used to launch a ransomware attack? More than one answer may be correct.
Phising, trojan horse, keylogger
Which of the following is an example of an event that may occur during the protect stage of the plan-protect-respond cycle? More than one answer may be correct.
Provide employees with information regarding the specific types of security threats their organization faces, Make sure resources are protected through routine maintenance, Limit remote access to sensitive data.
A corporation that was recently the victim of hacking that was caused by a high-level employee falling for a phishing scheme institutes a required, annual, self-paced training module that alerts employees to the most common recent phishing attacks. The institution of this new training requirement represents which phase of the plan-protect-respond cycle? Multiple Choice
Respond
The purpose of the application protocol layer of TCP/IP is to
define how email programs and other software communicate within and across networks.
What type of firewall would filter messages coming from a specific, predefined IP address to a spam filter?
packet filter
Which of the National Institute of Standards Technology (NIST) Cybersecurity Framework functions entails an analysis of cybersecurity risk and reduction of potential damage to IT infrastructures?
protect (PR) function