Cyber Security
Which of the following security vulnerabilities could result in the receipt of malicious information that could force a program to behave in an unintended way?
Non-validated input
An individual user profile on a social network site is an example of an _______ identity.
Online
How can you keep your personal browsing history hidden from other users on a shared computer?
Operate the web browser in private browser mode
You are looking to print photos that you have saved on a cloud storage account using a third-party online printing service. After successfully logging into the cloud account, you are automatically given access to the third-party online printing service. What allowed this automatic authentication to occur?
The cloud storage service is an approved application for the online printing service
What is the primary goal of a DoS attack?
To prevent the target server from being able to handle additional requests
Which of the following characteristics describe a worm? Select two correct answers
Travels to new computers without any intervention or knowledge of the user and Is self-replicating
'Securing physical access to target equipment is an organization's best defense against a cyber attack.' Is this true or false?
True
Which of the following is a key motivation of a white hat attacker?
Discovering weaknesses of networks and systems to improve the security level of these systems
What is the only way of ensuring that deleted files on your computer are irrecoverable?
Physically destroying your computer's hard drive
What tool is used to lure an attacker?
Honeypot
What tool can identify malicious traffic by comparing packet contents to known attack signatures?
IDS
Which of the following should be carried out to address known software vulnerabilities of a specific application?
Install a security patch
Which of the following examples illustrates how malware might be concealed?
An email is sent to the employees of an organization with an attachment that looks like an antivirus update, but the attachment actually consists of spyware
What do you call a program written to take advantage of a known security vulnerability?
An exploit
What is the last stage of a pen test?
Analysis and reporting
Which type of technology can prevent malicious software from monitoring user activities, collecting personal information and producing unwanted pop-up ads on a user computer?
Antispyware
what is the private browser called?
Incognito
What is the best method to prevent Bluetooth from being exploited?
Always disable Bluetooth when it is not being used
Which technology removes direct equipment and maintenance costs from the user for data backups?
A cloud service
A set of changes done to any program or application with the aim of updating, fixing or improving it is often referred to as what?
A patch
Which of the statements correctly describes cybersecurity?
Cybersecurity is the ongoing effort to protect individuals, organizations and governments from digital attacks
What can the skills developed by cybersecurity professionals be used for?
Cybersecurity professionals develop many skills that can be used for good or evil
What is the difference between a hacker and a cybersecurity professional?
Cybersecurity professionals must work within legal boundaries
Which of the following statements describes cyberwarfare?
Cyberwarfare is an Internet-based conflict that involves the penetration of information systems of other nations
Which of the following methods can be used to ensure confidentiality of information? Choose three correct answers
Data encryption and Two-factor authentication
Which of the following methods can be used to ensure confidentiality of information? Choose three correct answers
Data encryption, Two-factor authentication, Username ID and password
'Today, there are single security appliances that will solve all the network security needs of an organization.' Is this statement true or false?
False
What name is given to a device that controls or filters traffic going in or out of the network?
Firewall
What are the foundational principles for protecting information systems as outlined in the McCumber Cube? Choose three correct answers
Integrity, Availability, Confidentiality
Why might internal security threats cause greater damage to an organization than external security threats?
Internal users have direct access to the infrastructure devices
Why do IoT devices pose a greater security risk than other computing devices on a network?
Most IoT devices do not receive frequent software updates
What type of attack allows an attacker to use a brute-force approach?
Password cracking
Which configuration on a wireless router is not considered to be adequate security for a wireless network?
Preventing the broadcast of an SSID
What should you do in order to make sure that people you live with do not have access to your secure data?
Set up password protection
Which of the following tools can perform real-time traffic and port analysis, and can also detect port scans, fingerprinting and buffer overflow attacks?
Snort
Which of the following pieces of information would be classified as personal data? Choose 3
Social security number, Driver license number, Date and place of birth
Which of the following is an example of two factor authentication?
Your fingerprint and your password
Your neighbor tells you that they don't have an online identity. They have no social media accounts and only use the Internet to browse. Is your neighbor right?
no