Cyber Security Quiz/Test

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which Windows Registry hive stores file extensions for applications?

HKEY_CLASSES_ROOT

To which part of the CIA triangle does "Encrypt a nonvolatile storage unit" apply?

Confidentiality

A server is in a physically secure part of a building which is protected by guards and fences. This layered approach of security, to where one does more than just password-protect the server, is part of___________

Defense-in-depth

Cyber security protection of an organization is the responsibility of...

Everyone in the Organization

Cyber criminals only target large companies. True or False?

False

BitLocker, when possible, stores the encryption key on a computer's _____

TPM

What should the department head do in order to be able to control permissions?

Take ownership of the folder

A junior administrator asks you what it means to harden a server. Which two statements fit the description of hardening a server?

Uninstall unnecessary features and disable unnecessary services

To change (something) by including the most recent information

Updates

Which of the following should you do to restrict access to your files and devices?

Use multi-factor authentication.

A secure form of Hypertext Transfer Protocol (HTTP) that is used to exchange information between webpages or access information found on a webpage.

https:

Which protocol should be allowed only on email servers used to send email and should be blocked on all other servers and clients machines?

SMTP

What are two typical DMZ configs used in perimeter networks?

Sandwich and Single firewall DMZ

In which ways can security templates be deployed?

Security Configuration and Analysis Snap-In and GPOs

Which tunneling protocol is used to carry packets from unroutable IP addresses across a routable IP network

GRE

Which type of VPN connection usually connects two business entities?

Site-to-site

Which of the following are advanced permissions in NTFS?

Take Ownership

Digital certificates are electronic documents that contain an identity as a user name or organization, along with ________

A public key

Cyber security should be viewed as a risk management problem because:

Absolute protection cannot be guaranteed.

Where, on a Windows Server, is a password reset for a domain user account

Active Directory Users and Computers

Which is the best answer for which people in a business should be responsible for cybersecurity?

All staff members should know some cybersecurity basics to reduce the risk of cyber attacks.

Having or showing realization, perception, or knowledge.

Awareness

Which two types of attacks are at least somewhat thwarted with the use of account lockout policy?

Brute Force and Dictionary Attacks

Measures were taken to protect a computer or computer system (as on the internet) against unauthorized access or attack.

Cybersecurity

Devices that store data digitally on non removable magnetic coated disks that are rotated underneath a read head.

Hard Disk Drive (HDD)

How can a wireless network best be set up to allow only specific devices onto the network?

MAC address filtering

software designed to infiltrate or damage a computer system without the user's normal functioning.

Malware

An attacker sets up a system that tricks the user's computer into thinking the attacker is the server, and tricks the server into thinking the attacker is the user's computer. What type of attack is this?

Man-in-the-middle attack

A secret series of numbers or letters that allows you to use a computer system.

Password

What does not represent two-factor authentication?

Password and PIN

A scam in which official-looking emails are sent to individuals in an attempt to get them to divulge private information such as passwords, usernames, and account numbers, which the scammers can use illicitly.

Phishing

Forms of electronic communication in which users create online communities and share information, including photos, videos, and messages, etc.

Social Media

computer software that secretly records information about the way you use your computer

Spyware

Which of the following is not considered a factor in determining cyber risk?

The Duration of the threat event

a type of malware that is often disguised as legitimate software.

Trojan

Backing up important files offline, on an external hard drive or in the cloud, will help protect your business in the event of a cyber attack. True or False?

True

a program that is designed to harm a computer by deleting data, ruining files, and that can spread secretly from on computer to another.

Virus

Which is not in the 5 types of cyber security?

Website Breaching

You can use IPSec Console to configure IPSec on a computer running Windows Server 2008:- Windows Firewall with Advanced Security- IPSec Security Tool- Windows Firewall with the IPSec plugin

Windows Firewall with Advanced Security

Which is Windows 10 authentications system that uses a user's face, iris, or fingerprint to unlock devices

Windows Hello


संबंधित स्टडी सेट्स

Policy riders Provisions options and exclusions

View Set

Coursepoint Ch 9: Assessing Pain: The 5th Vital Sign

View Set

Psy 456 Death and Loss exam #1 Study guide

View Set

Rocks and Minerals (Scavenger Hunt)

View Set

Mischel, Bandura, and George Kelley

View Set

DEALING WITH CONFIDENTIAL INFORMATION - NISSAN

View Set