Cybersecurity Essentials

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

What service determines which resources a user can access along with the operations that a user can perform?

Authorization

The X.509 standards defines which security technology?

digital certificates

What type of attack targets an SQL database using the input field of a user?

SQL Injection

An administrator of a small data center wants a flexible, secure method of remotely connecting to servers.Which protocol would be best to use?

SSH (Secure Shell)

Which two groups of people are considered internal attackers? (Choose two.)

Trusted partners, ex-employees

What does the acronym IoE represent?

Internet of Everything

What name is given to a storage device connected to a network?

NAS

Companies may have different operation centers that handle different issues with the IT operations. If an issue is related to network infrastructure, what operation center would be responsible?

NOC

What mechanism can organizations use to prevent accidental changes by authorized users?

Version Control

What does the term vulnerability mean?

A weakness that makes a target susceptible to an attack

What type of an attack can disable a computer by forcing it to use memory or by overworking its CPU?

Algorithm

What is the difference between an HIDS and a firewall?

An HIDS monitors operating systems on host computers and processes file system activity. Firewalls allow or deny traffic between the computer and other systems.

What is the workforce framework category that includes highly specialized review and evaluation of incoming cybersecurity information to determine if it is useful for intelligence?

Analyze

What is it called when an organization only installs applications that meet its guidelines, and administrators increase security by eliminating all other applications?

Asset Standardization

What type of cybersecurity laws protect you from an organization that might want to share your sensitive data?

Authentication

What are three access control security services? (Choose three.)

Authentication, authorization, accounting

What is the name given to a program or program code that bypasses normal authentication?

Backdoor

What name is given to any changes to the original data such as users manually modifying data, programs processing and changing data, and equipment failures?

Backup

A user is asked to analyze the current state of a computer operating system. What should the user compare the current operating system against to identify potential vulnerabilities?

Baseline

An attacker is sitting in front of a store and wirelessly copies emails and contact lists from nearby unsuspecting user devices. What type of attack is this?

Bluesnarfing

What occurs on a computer when data goes beyond the limits of a buffer?

Buffer Overflow

The awareness and identification of vulnerabilities is a critical function of a cybersecurity specialist. Which of the following resources can be used to identify specific details about vulnerabilities?

CVE national database

A user calls the help desk complaining that an application was installed on the computer and the application cannot connect to the Internet. There are no antivirus warnings and the user can browse the Internet. What is the most likely cause of the problem?

Computer Firewall

What type of attack uses many systems to flood the resources of a target, thus making the target unavailable?

DDoS

Which service will resolve a specific web address into an IP address of the destination web server?

DNS

A consultant is hired to make recommendations on managing device threats in a company. What are three general recommendations that can be made? (Choose three.)

Enable automated antivirus scans. Disable administrative rights for users. Enable screen lockout.

What are two methods that ensure confidentiality? (Choose two.)

Encryption authentication

What is identified by the first dimension of the cybersecurity cube?

Goals

A VPN will be used within the organization to give remote users secure access to the corporate network. What does IPsec use to authenticate the origin of every packet to provide data integrity checking?

HMAC

Which hashing technology requires keys to be exchanged?

HMAC

Which technology could be used to prevent a cracker from launching a dictionary or brute-force attack off a hash?

HMAC

What is an example of early warning systems that can be used to thwart cybercriminals?

Honeynet project

What are the three foundational principles of the cybersecurity domain? (Choose three.)

Integrity, Availability, Confidentiality

What are two ways to protect a computer from malware? (Choose two.)

Keep software up to date. Use antivirus software.

What approach to availability provides the most comprehensive protection because multiple defenses coordinate together to prevent attacks?

Layering

What approach to availability involves using file permissions?

Limiting

What is an example of an Internet data domain?

Linkedin

What does a rootkit modify?

Operating system

What are three types of sensitive information? (Choose three.)

PII classified business

Which type of cybercriminal attack would interfere with established network communication through the use of constructed packets so that the packets look like they are part of the normal communication?

Packet Forgery

What is the term used when a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source?

Phishing

Alice and Bob are using a digital signature to sign a document. What key should Alice use to sign the document so that Bob can make sure that the document came from Alice?

Private Key from Alice

A company has had several incidents involving users downloading unauthorized software, using unauthorized websites, and using personal USB devices. The CIO wants to put in place a scheme to manage the user threats. What three things might be put in place to manage the threats? (Choose three.)

Provide security awareness training. Use content filtering. Disable CD and USB access.

Which technology would you implement to provide high availability for data storage?

RAID

A new PC is taken out of the box, started up and connected to the Internet. Patches were downloaded and installed. Antivirus was updated. In order to further harden the operating system what can be done?

Remove unnecessary programs and services.

A user calls the help desk complaining that the password to access the wireless network has changed without warning. The user is allowed to change the password, but an hour later, the same thing occurs. What might be happening in this situation?

Rogue Access Point

What are two common hash functions? (Choose two.)

SHA MD5

Which hashing algorithm is recommended for the protection of sensitive, unclassified information?

SHA-256

You have been asked to implement a data integrity program to protect data files that need to be electronically downloaded by the sales staff. You have decided to use the strongest hashing algorithm available on your systems. Which hash algorithm would you select?

SHA-256

After a security audit for an organization, multiple accounts were found to have privileged access to systems and devices. Which three best practices for securing privileged accounts should be included in the audit report? (Choose three.)

Secure password storage. Enforce the principle of least privilege. Reduce the number of privileged accounts.

Which term describes the sending of a short deceptive SMS message used to trick a target into visiting a website

Smishing

What is the term used to describe an email that is targeting a specific person employed at a financial institution?

Spear Phishing

Being able to maintain availability during disruptive events describes which of the principles of high availability?

System resiliency

The CIO wants to secure data on company laptops by implementing file encryption. The technician determines the best method is to encrypt each hard drive using Windows BitLocker. Which two things are needed to implement this solution? (Choose two.)

TPM= timbalan perdana menteri kepala bapak kau at least two volumes

What are two common indicators of spam mail? (Choose two.)

The email has no subject line. The email has misspelled words or punctuation errors or both.

What is a feature of a cryptographic hash function?

The hash function is a one-way mathematical function.

Which two reasons describe why WEP is a weak protocol? (Choose two.)

The key is static and repeats on a congested network. The key is transmitted in clear text.

Technicians are testing the security of an authentication system that uses passwords. When a technician examines the password tables, the technician discovers the passwords are stored as hash values. However, after comparing a simple password hash, the technician then discovers that the values are different from those on other systems. What are two causes of this situation? (Choose two.)

The systems use different hashing algorithms. One system uses hashing and the other uses hashing and salting.

Which statement best describes a motivation of hacktivists?

They are part of a protest group behind a political cause

Technologies like GIS and IoE contribute to the growth of large data stores. What are two reasons that these technologies increase the need for cybersecurity specialists? (Choose two.)

They collect sensitive information They contain personal information

A company wants to implement biometric access to its data center. The company is concerned with people being able to circumvent the system by being falsely accepted as legitimate users. What type of error is false acceptance?

Type II

A user is proposing the purchase of a patch management solution for a company. The user wants to give reasons why the company should spend money on a solution. What benefits does patch management provide? (Choose three.)

Updates cannot be circumvented. Administrators can approve or deny patches. Updates can be forced on systems immediately.

The company has many users who telecommute. A solution needs to be found so a secure communication channel can be established between the remote location of users and the company. What is a good solution for this situation?

VPN

What is the difference between a virus and a worm?

Worms self-replicate but viruses do not.

What is a vulnerability that allows criminals to inject scripts into web pages viewed by users?

XSS (Cross Site Scripting)

What is the meaning of the term logic bomb?

a malicious program that uses a trigger to awaken the malicious code

A computer is presenting a user with a screen requesting payment before the user data is allowed to be accessed by the same user. What type of malware is this?

a type of ransomware

You have been asked to work with the data collection and entry staff in your organization in order to improve data integrity during initial data entry and data modification operations. Several staff members ask you to explain why the new data entry screens limit the types and size of data able to be entered in specific fields. What is an example of a new data integrity control?

a validation rule which has been implemented to ensure completeness, accuracy, and consistency of data

Which two values are required to calculate annual loss expectancy? (Choose two.)

annual rate of occurrence single loss expectancy

An organization wants to adopt a labeling system based on the value, sensitivity, and criticality of the information. What element of risk management is recommended?

asset classification

The manager of a department suspects someone is trying to break into computers at night. You are asked to find out if this is the case. What logging would you enable?

audit

What are two methods that ensure confidentiality? (Choose two.)

authorization authentication

What principle prevents the disclosure of information to unauthorized people, resources, and processes?

confidentiality

What are two incident response phases? (Choose two.)

containment and recovery detection and analysis

What technology should be implemented to verify the identity of an organization, to authenticate its website, and to provide an encrypted connection between a client and the website?

digital certificate

Your organization will be handling market trades. You will be required to verify the identify of each customer who is executing a transaction. Which technology should be implemented to authenticate and verify customer electronic transactions?

digital certificates

What technology should you implement to ensure that an individual cannot later claim that he or she did not sign a given document?

digital signature

Why should WEP not be used in wireless networks today?

easily crackable

What three design principles help to ensure high availability? (Choose three.)

eliminate single points of failure detect failures as they occur provide for reliable crossover

The manager of desktop support wants to minimize downtime for workstations that crash or have other software-related issues. What are three advantages of using disk cloning? (Choose three.)

ensures a clean imaged machine can provide a full system backup easier to deploy new computers within the organization

What kind of integrity does a database have when all its rows have a unique identifier called a primary key?

entity integrity

What two methods help to ensure system availability? (Choose two.)

equipment maintenance up-to-date operating systems

Thwarting cyber criminals includes which of the following? (Choose two.)

establishing early warning systems sharing cyber Intelligence information

What three tasks are accomplished by a comprehensive security policy? (Choose three.)

gives security staff the backing of management is not legally binding defines legal consequences of violations

Which two methods help to ensure data integrity? (Choose two.)

hashing, data consistency checks

A specialist in the HR department is invited to promote the cybersecurity program in community schools. Which three topics would the specialist emphasize in the presentation to draw students to this field? (Choose three.)

high earning potential a career-field in high-demand service to the public

An organization has recently adopted a five nines program for two critical database servers. What type of controls will this involve?

improving reliability and uptime of the servers

What are the three states of data? (Choose three.)

in-transit in-process at rest

Why is WPA2 better than WPA?

mandatory use of AES algorithms

Pick three types of records that cyber criminals would be interested in stealing from organizations. (Choose three.)

medical employment education

Keeping data backups offsite is an example of which type of disaster recovery control?

preventive

Your risk manager just distributed a chart that uses three colors to identify the level of threat to key assets in the information security systems. Red represents high level of risk, yellow represents average level of threat and green represents low level of threat. What type of risk analysis does this chart represent?

qualitative analysis

The team is in the process of performing a risk analysis on the database services. The information collected includes the initial value of these assets, the threats to the assets and the impact of the threats. What type of risk analysis is the team performing by calculating the annual loss expectancy?

quantitative analysis

An organization has determined that an employee has been cracking passwords on administrative accounts in order to access very sensitive payroll information. Which tools would you look for on the system of the employee? (Choose three)

reverse lookup tables rainbow tables lookup tables

An intern has started working in the support group. One duty is to set local policy for passwords on the workstations. What tool would be best to use?

secpol.msc

There are many environments that require five nines, but a five nines environment may be cost prohibitive. What is one example of where the five nines environment might be cost prohibitive?

the New York Stock Exchange

A user makes a request to implement a patch management service for a company. As part of the requisition the user needs to provide justification for the request. What three reasons can the user use to justify the request? (Choose three.)

the ability to control when updates occur the ability to obtain reports on systems no opportunities for users to circumvent updates

Which risk mitigation strategies include outsourcing services and purchasing insurance?

transfer

What are two of the tactics used by a social engineer to obtain personal information from an unsuspecting target? (Choose two.)

urgency intimidation


Ensembles d'études connexes

Ultimate (Amazing) Climatic History

View Set

AP Art History Greece (IMAGE SET)

View Set

Chapter 4 T/F Review - Computer Programming

View Set

Legal Concepts of the Insurance Contract

View Set