cyber security test 13-15

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following describes Mobile Device Management software?

A combination of an on-device application or agent that communicates with a backend server to receive policies and settings.

Which of the following describes a PKI?

A security architecture that ensures data connections between entities are validated and secure.

Which of the following cryptography attacks is characterized by the attacker making a series of interactive queries and choosing subsequent plain texts based on the information from the previous encryption?

Adaptive chosen plain text

Which of the following best describes a certificate authority (CA)?

An entity that issues digital certificates.

Which of the following types of Bluetooth hacking is a denial-of-service attack?

Bluesmacking

Which of the following Bluetooth hacking tools is a complete framework to perform man-in-the-middle attacks on Bluetooth smart devices?

Btlejuice

You are a cybersecurity specialist. ACME, Inc. has hired you to install and configure their wireless network. As part of your installation, you have decided to use Wi-Fi Protected Access 2 (WPA2) security on all of your wireless access points. You want to ensure that the highest level of security is used. Which of the following encryption protocols should you use to provide the highest level of securty?

CCMP

You have just discovered that a hacker is trying to penetrate your network using MAC spoofing. Which of the following best describes MAC spoofing?

Changing a hacker's network card to match a legitimate address being used on a network.

Which of the following best describes the Platform as a Service (PaaS) cloud computing service model?

Delivers everything a developer needs to build an application on the cloud infrastructure.

Which of the following bring-your-own-device (BYOD) risks is both a security issue for an organization and a privacy issue for a BYOD user?

Mixing personal and corporate data

A company has implemented the following defenses: The data center is located in safe geographical area. Backups are in different locations. Mitigation measures are in place. A disaster recovery plan is in place. Which of the following cloud computing threats has the customer implemented countermeasures against?

Natural disasters

Which of the following types of wireless antenna is shown in the image?

Parabolic

Mary is using asymmetric cryptography to send a message to Sam so that only Sam can read it. Which of the following keys should she use to encrypt the message?

Sam's public key

Which of the following best describes this image?

The iOS operating system stack.

Which of the following best explains why brute force attacks are always successful?

They test every possible valid combination.

Which of the following is the number of keys used in symmetric encryption?

one

Which of the following can void a mobile device's warranty, cause poor performance, or brick a mobile device (making it impossible to turn on or repair)?

rooting or jailbreaking

Which of the following is the number of keys used in asymmetric (public key) encryption?

two

Which of the following is a short-range wireless personal area network that supports low-power, long-use IoT needs?

BLE

Which of the following types of wireless antenna is shown?

yagi

Which of the following best describes a cybersquatting cloud computing attack?

The hacker uses phishing scams by making a domain name that is almost the same as the cloud service provider.

Which of the following is an open-source cryptography toolkit that implements SSL and TLS network protocols and the related cryptography standards required by them?

OpenSSL

Which of the following is the correct order for a hacker to launch an attack?

Information gathering, vulnerability scanning, launch attack, gain remote access, maintain access

Which of the following Bluetooth attack countermeasures would help prevent other devices from finding your Bluetooth device that is in continuous operation?

Use hidden mode when your Bluetooth device is enabled.

Which of the following uses on-the-fly encryption, meaning the data is automatically encrypted immediately before it is saved and decrypted immediately after it is loaded?

VeraCrypt


संबंधित स्टडी सेट्स

IT 1113 Module 1: Introduction to Programming

View Set

Cardiovascular System, Blood, and Lymphatic Systems EAQs

View Set

ITEC Chapter 1 - 3 - Software, Hardware, and Internet

View Set