Intro to CS

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following approaches would be considered as an ethical hacker? A) A hacker operates for moral and legal purposes. B) None of the above. C) A hacker is motivated by a political agenda. D) A hacker who seeks financial gain.

A) A hacker operates for moral and legal purposes.

Which of the following manages users and centralizes network resource access management in Windows Environment? A) Active Directory (AD) B) Mobile Device Management (MDM) C) Integrity D) OSINT

A) Active Directory (AD)

What are some potential impacts of a cybersecurity breach? A) All of the above B) Financial loss due to theft or destruction of data Legal and regulatory penalties for non-compliance Damage to reputation and loss of customer trust

A) All of the Above

What does the "A" in the CIA triad stand for? A) Availability B) Accounts C) Approvals D) Agency

A) Availability

What is the primary focus of generative AI? A) Creating new content from existing data B) Mimicking human cognitive abilities C) Enhancing security measures and detecting threats D) Surpassing human intelligence

A) Creating new content from existing data

Which of the following is not one of the three states of data? A) Data under investigation B) Data in use C) Data in transit D) Data at rest

A) Data under Investigation

Attack flooding target, causing inaccessibility or crash? A) DoS B) Ransomware C) Masquerade D) Defacement Attack

A) DoS

Which tool can be used to scan and map computers on a network? A) Nmap B) Ping C) Ettercap D) Hydra

A) Nmap

Intercepting traffic between 2 computers___? A) On-path attack B) SQL injection C) Zero-day exploit D) Phishing

A) On-path attack

Which of the following is not considered a social engineering tactic? A) Password cracking B) Phishing C) Vishing D) Pretexting

A) Password cracking

Which of the following are great resources for cybersecurity learners? Select all that apply: A) Youtube B) Books C) Linkedin D) AI

All of the Above

What is Data Loss Prevention (DLP)? A) A technique used to encrypt information. B) A technique used to prevent unauthorized access to sensitive information. C) A Microsoft service to share data between entities. D) A network security service to block cyber-attacks.

B) A technique used to prevent unauthorized access to sensitive information.

Which circumstance(s) can be considered as a common threat vector?A) Malware-infected attachments B) All of the above C) Outdated software and hardware D) Phishing emails

B) All of the Above

Which of the following descriptions is included in the category of OS hardening? A) The process of updating an operating system to its latest version. B) All of the above. C) The process of improving the security of an operating system. D) The process of removing unused features from an operating system.

B) All of the above.

What does Windows Defender ATP proactively do in client hardening? A) Automates routine tasks. B) Analyze misconfigured endpoints. C) Set up a backup mechanism. D) Enhances network connectivity.

B) Analyze misconfigured endpoints.

Which certification is given to you for free in the extended course? A) Certified Ethical Hacker B) CompTIA Security+ C) GIAC Certified Forensic Examiner (GCFE) D) Systems Security Certified Practitioner (SSCP)

B) CompTIA Security+

A VPN service can be used for secure? A) Data in archiving B) Data in transit C) Data at rest D) Data in use

B) Data in transit

Which of the following terms is an example of a Linux distribution? A) Bootloader B) Kali C) Kernel D) Root

B) Kali

What is the first class in the extended course? A) Intro to Cybersecurity B) Networking C) Linux D) Microsoft

B) Networking

The Installation Phase related to Cyber Kill Chain, in most cases, represents? A) Network Scanning B) Persistence C) Exploitation D) Reconnaissance

B) Persistence

A malicious program that encrypts data and demands payment? A) Spyware B) Ransomware C) Virus D) Trojan

B) Ransomware

Which concept is used to divide a network into multiple zones? A) Segregation B) Segmentation C) Router D) Firewall

B) Segmentation

What is the purpose of Two-Factor Authentication (2FA)? A) To enhance network connectivity and data transfer speeds B) To add an extra layer of protection to the authorization process To restrict access to specific resources within an organization To analyze and interpret large volumes of data for insights

B) To add an extra layer of protection to the authorization process

Which of the following is the correct equation for risk? A) Risk management + asset management = risk B) Confidentiality + integrity + availability = risk C) Asset + vulnerability + threat = risk D) Vector + asset + credentials = risk

C)

Which application type works with operating systems and saves files directly to the file system? A) All of the above B) Mobile Application C) Desktop Application D) Progressive Web Application

C) Desktop Application

Which aspect of the CIA triad ensures data accuracy? A) Instantiation B) Inheritance C) Integrity D) Iteration

C) Integrity

Which Social Network is for professionals looking for a career? A) Instagram B) Facebook C) LinkedIn D) Twitter (X)

C) LinkedIn

According to NIST, what is the primary objective of incident response (IR)? A) Support the electrical team if there is a power outage B) Minimizing weaknesses before the incident C) Mitigating violations of security policies and recommended practices D) Providing support services for the end user

C) Mitigating violations of security policies and recommended practices

What programming language will you learn to use in the extended course? A) C++ B) Kali C) Python D) Java

C) Python

Which of the following definitions does not describe an active attack? A) Flooding a web server with botnet traffic B) Inserting a malicious file into an organization's systems C) Reviewing the LinkedIn profiles of target organizations' employees D) Performing a brute-force attack against an internet service

C) Reviewing the LinkedIn profiles of target organizations' employees

What is the primary purpose of a Local Area Network (LAN)? A) To link multiple networks together into one more extensive network. B) To connect devices within a large geographic area C) To allow communication between devices within a small geographic area D) To provide a secure internet connection

C) To allow communication between devices within a small geographic area

What is Hydra used for? A) To configure security restrictions at enterprise networks. B) To accomplish encryption and backup information. C) To perform password cracking using brute-force attacks. D) To generate secure passwords for daily usage.

C) To perform password cracking using brute-force attacks.

Which type of malware can self-replicate across a network? A) Virus B) Adware C) Worm D) Spyware

C) Worm

Which command is used to list files and directories in the Linux operating system? A) pwd B) cd C) ls D) touch

C) ls

What is the primary purpose of a firewall? A)To create new user accounts. B) To connect users to the internet. C) To filter network traffic. D) To assign IP addresses.

C) to filter network traffic

How do breaches affect an organization? A) Reputation Loss B) Financial Impact C) Legal Liability D) All of the Above

D) All of the Above

Which phase of the cyber kill chain is where attacker maintains communication between target and themselves? A) Reconnaissance B) Exploitation C) Installation D) Command & Control (C2)

D) Command & Control (C2)

What is an application? A) A method of a data-storing hardware component. B) None of the above. C) A type of network used to transmit data. D) Computer software designed for a specific task.

D) Computer software designed for a specific task.

What is the purpose of the ping command? A) To check if a computer is vulnerable B) To identify the host's MAC address C) To track a host and reach the source D) To verify network connectivity between hosts

D) To verify network connectivity between hosts

Nothing you did careerwise before cyber will help you: True or False?

False


Ensembles d'études connexes

Prep U for Abrams's Clinical Drug Therapy, 10th Edition Chapter 12: Drug Therapy for the Treatment of Cancer

View Set

Global History 1: Last Unit of the Year Day 4

View Set

Intervention Strategies for the Neuro Patient (neuro)

View Set

Exam 2 Quiz Questions Szarka-Lock Haven

View Set

Seasonal Influenza Vaccination Training (2 hr) PRE TEST

View Set