Intro to CS
Which of the following approaches would be considered as an ethical hacker? A) A hacker operates for moral and legal purposes. B) None of the above. C) A hacker is motivated by a political agenda. D) A hacker who seeks financial gain.
A) A hacker operates for moral and legal purposes.
Which of the following manages users and centralizes network resource access management in Windows Environment? A) Active Directory (AD) B) Mobile Device Management (MDM) C) Integrity D) OSINT
A) Active Directory (AD)
What are some potential impacts of a cybersecurity breach? A) All of the above B) Financial loss due to theft or destruction of data Legal and regulatory penalties for non-compliance Damage to reputation and loss of customer trust
A) All of the Above
What does the "A" in the CIA triad stand for? A) Availability B) Accounts C) Approvals D) Agency
A) Availability
What is the primary focus of generative AI? A) Creating new content from existing data B) Mimicking human cognitive abilities C) Enhancing security measures and detecting threats D) Surpassing human intelligence
A) Creating new content from existing data
Which of the following is not one of the three states of data? A) Data under investigation B) Data in use C) Data in transit D) Data at rest
A) Data under Investigation
Attack flooding target, causing inaccessibility or crash? A) DoS B) Ransomware C) Masquerade D) Defacement Attack
A) DoS
Which tool can be used to scan and map computers on a network? A) Nmap B) Ping C) Ettercap D) Hydra
A) Nmap
Intercepting traffic between 2 computers___? A) On-path attack B) SQL injection C) Zero-day exploit D) Phishing
A) On-path attack
Which of the following is not considered a social engineering tactic? A) Password cracking B) Phishing C) Vishing D) Pretexting
A) Password cracking
Which of the following are great resources for cybersecurity learners? Select all that apply: A) Youtube B) Books C) Linkedin D) AI
All of the Above
What is Data Loss Prevention (DLP)? A) A technique used to encrypt information. B) A technique used to prevent unauthorized access to sensitive information. C) A Microsoft service to share data between entities. D) A network security service to block cyber-attacks.
B) A technique used to prevent unauthorized access to sensitive information.
Which circumstance(s) can be considered as a common threat vector?A) Malware-infected attachments B) All of the above C) Outdated software and hardware D) Phishing emails
B) All of the Above
Which of the following descriptions is included in the category of OS hardening? A) The process of updating an operating system to its latest version. B) All of the above. C) The process of improving the security of an operating system. D) The process of removing unused features from an operating system.
B) All of the above.
What does Windows Defender ATP proactively do in client hardening? A) Automates routine tasks. B) Analyze misconfigured endpoints. C) Set up a backup mechanism. D) Enhances network connectivity.
B) Analyze misconfigured endpoints.
Which certification is given to you for free in the extended course? A) Certified Ethical Hacker B) CompTIA Security+ C) GIAC Certified Forensic Examiner (GCFE) D) Systems Security Certified Practitioner (SSCP)
B) CompTIA Security+
A VPN service can be used for secure? A) Data in archiving B) Data in transit C) Data at rest D) Data in use
B) Data in transit
Which of the following terms is an example of a Linux distribution? A) Bootloader B) Kali C) Kernel D) Root
B) Kali
What is the first class in the extended course? A) Intro to Cybersecurity B) Networking C) Linux D) Microsoft
B) Networking
The Installation Phase related to Cyber Kill Chain, in most cases, represents? A) Network Scanning B) Persistence C) Exploitation D) Reconnaissance
B) Persistence
A malicious program that encrypts data and demands payment? A) Spyware B) Ransomware C) Virus D) Trojan
B) Ransomware
Which concept is used to divide a network into multiple zones? A) Segregation B) Segmentation C) Router D) Firewall
B) Segmentation
What is the purpose of Two-Factor Authentication (2FA)? A) To enhance network connectivity and data transfer speeds B) To add an extra layer of protection to the authorization process To restrict access to specific resources within an organization To analyze and interpret large volumes of data for insights
B) To add an extra layer of protection to the authorization process
Which of the following is the correct equation for risk? A) Risk management + asset management = risk B) Confidentiality + integrity + availability = risk C) Asset + vulnerability + threat = risk D) Vector + asset + credentials = risk
C)
Which application type works with operating systems and saves files directly to the file system? A) All of the above B) Mobile Application C) Desktop Application D) Progressive Web Application
C) Desktop Application
Which aspect of the CIA triad ensures data accuracy? A) Instantiation B) Inheritance C) Integrity D) Iteration
C) Integrity
Which Social Network is for professionals looking for a career? A) Instagram B) Facebook C) LinkedIn D) Twitter (X)
C) LinkedIn
According to NIST, what is the primary objective of incident response (IR)? A) Support the electrical team if there is a power outage B) Minimizing weaknesses before the incident C) Mitigating violations of security policies and recommended practices D) Providing support services for the end user
C) Mitigating violations of security policies and recommended practices
What programming language will you learn to use in the extended course? A) C++ B) Kali C) Python D) Java
C) Python
Which of the following definitions does not describe an active attack? A) Flooding a web server with botnet traffic B) Inserting a malicious file into an organization's systems C) Reviewing the LinkedIn profiles of target organizations' employees D) Performing a brute-force attack against an internet service
C) Reviewing the LinkedIn profiles of target organizations' employees
What is the primary purpose of a Local Area Network (LAN)? A) To link multiple networks together into one more extensive network. B) To connect devices within a large geographic area C) To allow communication between devices within a small geographic area D) To provide a secure internet connection
C) To allow communication between devices within a small geographic area
What is Hydra used for? A) To configure security restrictions at enterprise networks. B) To accomplish encryption and backup information. C) To perform password cracking using brute-force attacks. D) To generate secure passwords for daily usage.
C) To perform password cracking using brute-force attacks.
Which type of malware can self-replicate across a network? A) Virus B) Adware C) Worm D) Spyware
C) Worm
Which command is used to list files and directories in the Linux operating system? A) pwd B) cd C) ls D) touch
C) ls
What is the primary purpose of a firewall? A)To create new user accounts. B) To connect users to the internet. C) To filter network traffic. D) To assign IP addresses.
C) to filter network traffic
How do breaches affect an organization? A) Reputation Loss B) Financial Impact C) Legal Liability D) All of the Above
D) All of the Above
Which phase of the cyber kill chain is where attacker maintains communication between target and themselves? A) Reconnaissance B) Exploitation C) Installation D) Command & Control (C2)
D) Command & Control (C2)
What is an application? A) A method of a data-storing hardware component. B) None of the above. C) A type of network used to transmit data. D) Computer software designed for a specific task.
D) Computer software designed for a specific task.
What is the purpose of the ping command? A) To check if a computer is vulnerable B) To identify the host's MAC address C) To track a host and reach the source D) To verify network connectivity between hosts
D) To verify network connectivity between hosts
Nothing you did careerwise before cyber will help you: True or False?
False