CISCO FINAL QUIZ

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What three best practices can help defend against social engineering attacks? (Choose three.) -Enable a policy that states that the IT department should supply information over the phone only to managers. -Educate employees regarding policies. -Add more security guards. -Do not provide password resets in a chat window. -Deploy well-designed firewall appliances. -Resist the urge to click on enticing web links.

-Educate employees regarding policies. -Do not provide password resets in a chat window. -Resist the urge to click on enticing web links.

Which statement describes a distributed denial of service attack?" An attacker builds a botnet comprised of zombies. An attacker sends an enormous quantity of data that a server cannot handle. An attacker views network traffic to learn authentication credentials. One computer accepts data packets based on the MAC address of another computer.

An attacker builds a botnet comprised of zombies.

The employees in a company receive an email stating that the account password will expire immediately and requires a password reset within 5 minutes. Which statement would classify this email? It is a DDoS attack. It is a hoax. It is an impersonation attack. It is a piggy-back attack.

It is a hoax.

What happens as the key length increases in an encryption application? Keyspace decreases exponentially. Keyspace increases exponentially. Keyspace decreases proportionally. Keyspace increases proportionally.

Keyspace increases exponentially.

What Windows utility should be used to configure password rules and account lockout policies on a system that is not part of a domain? Active Directory Security tool Local Security Policy tool Event Viewer security log Computer Management

Local Security Policy tool

A penetration testing service hired by the company has reported that a backdoor was identified on the network. What action should the organization take to find out if systems have been compromised? Look for policy changes in Event Viewer. Scan the systems for viruses. Look for unauthorized accounts. Look for usernames that do not have passwords.

Look for unauthorized accounts.

Which of the following products or technologies would you use to establish a baseline for an operating system? MS Baseliner Microsoft Security Baseline Analyzer CVE Baseline Analyzer SANS Baselining System (SBS)

Microsoft Security Baseline Analyzer

Which technology should be used to enforce the security policy that a computing device must be checked against the latest antivirus update before the device is allowed to connect to the campus network? NAC VPN SAN NAS

NAC

Which national resource was developed as a result of a U.S. Executive Order after a ten-month collaborative study involving over 3,000 security professionals? ISO OSI model NIST Framework ISO/IEC 27000 the National Vulnerability Database (NVD)

NIST Framework

Which technology would you implement to provide high availability for data storage? software updates RAID hot standby N+1

RAID

What type of attack will make illegitimate websites higher in a web search result list? DNS poisoning browser hijacker spam SEO poisoning

SEO poisoning

Which hashing algorithm is recommended for the protection of sensitive, unclassified information? SHA-256 3DES MD5 AES-256

SHA-256

You have been asked to implement a data integrity program to protect data files that need to be electronically downloaded by the sales staff. You have decided to use the strongest hashing algorithm available on your systems. Which hash algorithm would you select? SHA-1 AES MD5 SHA-256

SHA-256 (MD5 and SHA are the two most popular hashing algorithms. SHA-256 uses a 256-bit hash, whereas MD5 produces a 128-bit hash value.)

Which protocol would be used to provide security for employees that access systems remotely from home? WPA Telnet SCP SSH

SSH

Which law was enacted to prevent corporate accounting-related crimes? The Federal Information Security Management Act Import/Export Encryption Act Gramm-Leach-Bliley Act Sarbanes-Oxley Act

Sarbanes-Oxley Act

Which website offers guidance on putting together a checklist to provide guidance on configuring and hardening operating systems? The National Vulnerability Database website Internet Storm Center The Advanced Cyber Security Center CERT

The National Vulnerability Database website

Which access control should the IT department use to restore a system back to its normal state? preventive detective corrective compensative

corrective

Before data is sent out for analysis, which technique can be used to replace sensitive data in nonproduction environments to protect the underlying information? steganalysis software obfuscation steganography data masking substitution

data masking substitution

What technology should be implemented to verify the identity of an organization, to authenticate its website, and to provide an encrypted connection between a client and the website? digital signature salting asymmetric encryption digital certificate

digital certificate

The X.509 standards defines which security technology? digital certificates security tokens strong passwords biometrics

digital certificates

What technology should you implement to ensure that an individual cannot later claim that he or she did not sign a given document? asymmetric encryption HMAC digital certificate digital signature

digital signature

Which technology can be used to protect VoIP against eavesdropping? encrypted voice messages strong authentication SSH ARP

encrypted voice messages

Which technology can be used to ensure data confidentiality? hashing identity management encryption RAID

encryption

What kind of integrity does a database have when all its rows have a unique identifier called a primary key? user-defined integrity referential integrity entity integrity domain integrity

entity integrity

Which two groups of people are considered internal attackers? (Choose two.) ex-employees amateurs black hat hackers hacktivists trusted partners

ex-employees trusted partners

You have been asked to describe data validation to the data entry clerks in accounts receivable. Which of the following are good examples of strings, integers, and decimals? male, $25.25, veteran yes/no 345-60-8745, TRF562 800-900-4560, 4040-2020-8978-0090, 01/21/2013 female, 9866, $125.50

female, 9866, $125.50

An organization has recently adopted a five nines program for two critical database servers. What type of controls will this involve? -stronger encryption systems -remote access to thousands of external users -limiting access to the data on these systems -improving reliability and uptime of the servers

improving reliability and uptime of the servers

An executive manager went to an important meeting. The secretary in the office receives a call from a person claiming that the executive manager is about to give an important presentation but the presentation files are corrupted. The caller sternly recommends that the secretary email the presentation right away to a personal email address. The caller also states that the executive is holding the secretary responsible for the success of this presentation. Which type of social engineering tactic would describe this scenario? familiarity intimidation trusted partners urgency

intimidation

What approach to availability provides the most comprehensive protection because multiple defenses coordinate together to prevent attacks? layering obscurity limiting diversity

layering

What approach to availability involves using file permissions? obscurity layering simplicity limiting

limiting

Smart cards and biometrics are considered to be what type of access control? technological logical physical administrative

logical

Mutual authentication can prevent which type of attack? wireless sniffing man-in-the-middle wireless IP spoofing wireless poisoning

man-in-the-middle

Which methods can be used to implement multifactor authentication? IDS and IPS tokens and hashes VPNs and VLANs passwords and fingerprints

passwords and fingerprints

HVAC, water system, and fire systems fall under which of the cybersecurity domains? network user device physical facilities

physical facilities

Which utility uses the Internet Control Messaging Protocol (ICMP)? NTP ping DNS RIP

ping

Keeping data backups offsite is an example of which type of disaster recovery control? detective management preventive corrective

preventive

Alice and Bob are using a digital signature to sign a document. What key should Alice use to sign the document so that Bob can make sure that the document came from Alice? public key from Bob private key from Alice private key from Bob username and password from Alice

private key from Alice

The team is in the process of performing a risk analysis on the database services. The information collected includes the initial value of these assets, the threats to the assets and the impact of the threats. What type of risk analysis is the team performing by calculating the annual loss expectancy? qualitative analysis loss analysis protection analysis quantitative analysis

quantitative analysis

Users report that the database on the main server cannot be accessed. A database administrator verifies the issue and notices that the database file is now encrypted. The organization receives a threatening email demanding payment for the decryption of the database file. What type of attack has the organization experienced? DoS attack Trojan horse ransomware man-in-the-middle attack

ransomware

In a comparison of biometric systems, what is the crossover error rate? -rate of false negatives and rate of false positives -rate of false positives and rate of acceptability -rate of rejection and rate of false negatives -rate of acceptability and rate of false negatives

rate of false negatives and rate of false positives

An organization has implemented antivirus software. What type of security control did the company implement? deterrent control detective control recovery control compensative control

recovery control

An organization has determined that an employee has been cracking passwords on administrative accounts in order to access very sensitive payroll information. Which tools would you look for on the system of the employee? (Choose three) -password digest -reverse lookup tables -lookup tables -rouge access points -algorithm tables -rainbow tables

reverse lookup tables lookup tables rainbow tables

What technique creates different hashes for the same password? SHA-256 HMAC CRC salting

salting

What type of attack has an organization experienced when an employee installs an unauthorized device on the network to view network traffic? spoofing spamming sniffing phishing

sniffing

What is a nontechnical method that a cybercriminal would use to gather sensitive information from an organization? man-in-the-middle social engineering pharming ransomeware

social engineering

What is an impersonation attack that takes advantage of a trusted relationship between two systems? sniffing spamming man-in-the-middle spoofing

spoofing

Which data state is maintained in NAS and SAN services? stored data data in-transit encrypted data data in-process

stored data

What are three states of data during which data is vulnerable? (Choose three.) stored data data encrypted data decrypted purged data data in-transit data in-process

stored data data in-transit data in-process

Being able to maintain availability during disruptive events describes which of the principles of high availability? single point of failure uninterruptible services fault tolerance system resiliency

system resiliency

There are many environments that require five nines, but a five nines environment may be cost prohibitive. What is one example of where the five nines environment might be cost prohibitive? the U.S. Department of Education the front office of a major league sports team department stores at the local mall the New York Stock Exchange

the New York Stock Exchange

Alice and Bob are using public key encryption to exchange a message. Which key should Alice use to encrypt a message to Bob? the private key of Alice the public key of Bob the public key of Alice the private key of Bob

the public key of Bob

Which threat is mitigated through user awareness training and tying security awareness to performance reviews? cloud-related threats device-related threats user-related threats physical threats

user-related threats

Which cybersecurity weapon scans for use of default passwords, missing patches, open ports, misconfigurations, and active IP addresses? packet sniffers vulnerability scanners password crackers packet analyzers

vulnerability scanners

In which situation would a detective control be warranted? -when the organization cannot use a guard dog, so it is necessary to consider an alternative -after the organization has experienced a breach in order to restore everything back to a normal state -when the organization needs to repair damage -when the organization needs to look for prohibited activity

when the organization needs to look for prohibited activity

A cybersecurity specialist is asked to identify the potential criminals known to attack the organization. Which type of hackers would the cybersecurity specialist be least concerned with? gray hat hackers black hat hackers script kiddies white hat hackers

white hat hackers

Technicians are testing the security of an authentication system that uses passwords. When a technician examines the password tables, the technician discovers the passwords are stored as hash values. However, after comparing a simple password hash, the technician then discovers that the values are different from those on other systems. What are two causes of this situation? (Choose two.) -The systems use different hashing algorithms. -Both systems use MD5. -Both systems scramble the passwords before hashing. -One system uses hashing and the other uses hashing and salting. -One system uses symmetrical hashing and the other uses asymmetrical hashing.

-The systems use different hashing algorithms. -One system uses hashing and the other uses hashing and salting.

What are two incident response phases? (Choose two.) -detection and analysis -prevention and containment -confidentiality and eradication -risk analysis and high availability -mitigation and acceptance -containment and recovery

-detection and analysis -containment and recovery

A specialist in the HR department is invited to promote the cybersecurity program in community schools. Which three topics would the specialist emphasize in the presentation to draw students to this field? (Choose three.) -high earning potential -a career-field in high-demand -the CompTIA A+ certification provides an adequate knowledge base for the field -a job with routine, day-to-day tasks -service to the public -a field requiring a PhD degree

-high earning potential -a career-field in high-demand -service to the public

A user has a large amount of data that needs to be kept confidential. Which algorithm would best meet this requirement? ECC Diffie-Hellman RSA 3DES

3DES

Which algorithm will Windows use by default when a user intends to encrypt files and folders in an NTFS volume? RSA DES AES 3DES

AES

What describes the protection provided by a fence that is 1 meter in height? -It deters casual trespassers only. -The fence deters determined intruders. -It offers limited delay to a determined intruder. -It prevents casual trespassers because of its height.

It deters casual trespassers only.

Which statement describes a characteristics of block ciphers? -Block ciphers are faster than stream ciphers. -Block ciphers result in compressed output. -Block ciphers encrypt plaintext one bit at a time to form a block. -Block ciphers result in output data that is larger than the input data most of the time.

Block ciphers result in output data that is larger than the input data most of the time.

A VPN will be used within the organization to give remote users secure access to the corporate network. What does IPsec use to authenticate the origin of every packet to provide data integrity checking? password HMAC CRC salting

HMAC

Which hashing technology requires keys to be exchanged? HMAC salting MD5 AES

HMAC

Which hashing technology requires keys to be exchanged? MD5 HMAC salting AES

HMAC

What is an example of early warning systems that can be used to thwart cybercriminals? Honeynet project Infragard CVE database ISO/IEC 27000 program

Honeynet project

Which framework should be recommended for establishing a comprehensive information security management system in an organization? CIA Triad ISO OSI model NIST/NICE framework ISO/IEC 27000

ISO/IEC 27000

A security specialist is asked for advice on a security measure to prevent unauthorized hosts from accessing the home network of employees. Which measure would be most effective? Implement RAID. Implement a firewall. Implement intrusion detection systems. Implement a VLAN.

Implement a firewall.

Technologies like GIS and IoE contribute to the growth of large data stores. What are two reasons that these technologies increase the need for cybersecurity specialists? (Choose two.) They require 24-hour monitoring. They collect sensitive information. They contain personal information. They increase processing requirements. They require more equipment. They make systems more complicated.

They collect sensitive information. They contain personal information.

What are the two most effective ways to defend against malware? (Choose two.) Update the operating system and other application software. Implement RAID. Implement network firewalls. Implement strong passwords. Install and update antivirus software. Implement a VPN.

Update the operating system and other application software. Install and update antivirus software.

An organization allows employees to work from home two days a week. Which technology should be implemented to ensure data confidentiality as data is transmitted? VPN VLANS RAID SHS

VPN

Which wireless standard made AES and CCM mandatory? WPA2 WEP2 WPA WEP

WPA2

Which three protocols can use Advanced Encryption Standard (AES)? (Choose three.) WPA2 WEP WPA TKIP 802.11q 802.11i

WPA2 WPA 802.11i

You have been asked to work with the data collection and entry staff in your organization in order to improve data integrity during initial data entry and data modification operations. Several staff members ask you to explain why the new data entry screens limit the types and size of data able to be entered in specific fields. What is an example of a new data integrity control? -a limitation rule which has been implemented to prevent unauthorized staff from entering sensitive data -a validation rule which has been implemented to ensure completeness, accuracy, and consistency of data -data encryption operations that prevent any unauthorized users from accessing sensitive data -data entry controls which only allow entry staff to view current data

a validation rule which has been implemented to ensure completeness, accuracy, and consistency of data

An organization plans to implement security training to educate employees about security policies. What type of access control is the organization trying to implement? administrative logical physical technological

administrative

Which two values are required to calculate annual loss expectancy? (Choose two.) asset value exposure factor frequency factor annual rate of occurrence single loss expectancy quantitative loss value

annual rate of occurrence single loss expectancy

An organization wants to adopt a labeling system based on the value, sensitivity, and criticality of the information. What element of risk management is recommended? asset classification asset availability asset identification asset standardization

asset classification

What is it called when an organization only installs applications that meet its guidelines, and administrators increase security by eliminating all other applications? asset availability asset standardization asset classification asset identification

asset standardization

Passwords, passphrases, and PINs are examples of which security term? authorization access authentication identification

authentication


संबंधित स्टडी सेट्स

CH 27 LISTENING QUIZ: Vivaldi: Spring, from The Four Seasons, I LG 17

View Set

EverFi - Week 8 - "Consumer Protection"

View Set

Networking Essentials - Module 4

View Set

Team Development Final for Chapters 1-6

View Set

Test - Coordinate Adjectives/Misplaced Dangling Modifiers

View Set

Property and Casualty- Types of Property Policies Part 2.

View Set