CyberSec Midterm

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Which of the following is an example of an authorization control?

Access control list

Jackson is a cybercriminal. He is attempting to keep groups of a company's high-level users from accessing their work network using false passwords. What security method is he taking advantage of?

Account lockout policies

Brian notices an attack taking place on his network. When he digs deeper, he realizes that the attacker has a physical presence on the local network and is forging Media Access Control (MAC) addresses. Which type of attack is most likely taking place?

Address resolution protocol (ARP) poisoning

Which of the following enables businesses to transform themselves into an Internet of Things (IoT) service offering?

Anything as a Service (AaaS) delivery model

Carl recently joined a new organization. He noticed that the firewall technology used by the firm opens separate connections between the devices on both sides of the firewall. What type of technology is being used?

Application proxying

When examining data in Wireshark, the presence of ______ in the Packet List pane indicates that the data comes from a wireless network.

Beacon frames

In OpenVAS, the _______ measures how reliable a vulnerability's severity score is.

CVSS

What compliance regulation is similar to the European Union (EU) General Data Protection Regulation (GDPR) of 2016 and focuses on individual privacy and rights of data owners?

California Consumer Privacy Act (CCPA) of 2018

Rodrigo is a security professional. He is creating a policy that gives his organization control over mobile devices used by employees while giving them some options as to the type of device they will use. Which approach to mobile devices is Rodrigo focusing on in the policy?

Choose Your Own Device (CYOD)

You should enumerate recommended mitigations or next steps in this section of a formal Penetration Test Report.

Conclusion section

What term describes data that has been stripped of personally identifiable information for privacy reasons?

De-identified

Which type of password attack is used on weak passwords and compares a hashed value of the passwords to the system password file to find a match?

Dictionary attack

The Active Directory database is hosted on a specialized Windows Server system referred to as a ______, which functions as the central authority within the network of user accounts and computers that comprise the ______.

Domain Controller; domain

Lincoln is a network security specialist. He is updating the password policy for his company's computing infrastructure. His primary method of improving password policy involves lowering the chance that an attacker can compromise and use the password before it expires. What does he do?

Enables a 30-day password change policy

Which security control is most helpful in protecting against eavesdropping on wide area network (WAN) transmissions?

Encrypting transmissions with virtual private networks (VPNs)

Which of the following is not a defining aspect of using TCP as a connection-oriented protocol?

Encryption of a packet payload

What is the first priority when responding to a disaster recovery effort?

Ensuring that everyone is safe

Barry discovers that an attacker is running an access point in a building adjacent to his company. The access point is broadcasting the security set identifier (SSID) of an open network owned by the coffee shop in his lobby. Which type of attack is likely taking place?

Evil twin

True or False: A dictionary password attack is a type of attack in which one person, program, or computer disguises itself as another person, program, or computer to gain access to some resource.

False

True or False: A man-in-the-middle attack takes advantage of the multipath process used by many types of networks.

False

True or False: Another name for a border firewall is a demilitarized zone (DMZ) firewall.

False

True or False: Authorization controls include biometric devices.

False

True or False: Facility automation uses Internet of Things (IoT) to integrate automation into business functions to reduce reliance on machinery.

False

True or False: Hypertext Transfer Protocol (HTTP) encrypts data transfers between secure browsers and secure webpages.

False

True or False: Internet of Things (IoT) devices are typically physically secure.

False

True or False: Internet of Things (IoT) devices cannot share and communicate your IoT device data to other systems and applications without your authorization or knowledge.

False

True or False: Passphrases are less secure than passwords.

False

True or False: Regarding data-center alternatives for disaster recovery, a mobile site is the least expensive option but at the cost of the longest switchover time.

False

True or False? Bluejacking is an attack in which wireless traffic is sniffed between Bluetooth devices.

False

True or False? Physical access to network equipment is required to eavesdrop on a network connection.

False

True or False? Preventive controls merely attempt to suggest that a subject not take a specific action, whereas corrective controls do not allow the action to occur.

False

Arturo would like to connect a fibre channel storage device to systems over a standard data network. What protocol should he use?

Fibre Channel over Ethernet (FCoE)

Isabella is in charge of the disaster recovery plan (DRP) team. She needs to ensure that data center operations will transfer smoothly to an alternate site in the event of a major interruption. She plans to run a complete test that will interrupt the primary data center and transfer processing capability to a hot site. What option is described in this scenario?

Full-interruption test

Bob is the information security and compliance manager for a financial institution. Which regulation is most likely to directly apply to Bob's employer?

Gramm-Leach-Bliley Act (GLBA)

Which element of the security policy framework offers suggestions rather than mandatory actions?

Guideline

Which of the following would govern the use of Internet of Things (IoT) by health care providers, such as physicians and hospitals?

Health Insurance Portability and Accountability Act (HIPAA)

Which of the following is a command-line utility that is used to display the configuration values assigned to its network interface cards, including the MAC addresses, on a windows computer?

IPconfig

Keisha is a network administrator. She wants a cloud-based service that will allow her to load operating systems on virtual machines and manage them as if they were local servers. What service is Keisha looking for?

Infrastructure as a Service (IaaS)

The _____ make(s) a storage device available for remote users to use as a local disk drive.

NAS share

When adding a new Active Directory user through a PowerShell cmdlet, the ______ option specifies the name of the user object in Active Directory.

Name

What level of technology infrastructure should you expect to find in a cold site alternative data center facility?

No technology infrastructure

When a full tunnel is being used by a VPN client and server, you can expect the first hop in ______ to always be the gateway for the ______ network.

PUTTY; remote

What is an example of a logical access control?

Password

The Link Layer in the TCP/IP Model corresponds to the ______ and ______ Layers of the OSI Reference Model.

Physical; Data Link

An automatic teller machine (ATM) uses a form of constrained user interface to limit the user's ability to access resources in the system. Specifically for ATMs, which method is being used?

Physically constrained user interfaces

A Nessus scan report identifies vulnerabilities by a ______.

Plugin ID

Which of the following is a security principle that prevents users from writing to the Data Link layer?

Principle of least privilege

Chris is writing a document that provides step-by-step instructions for end users seeking to update the security software on their computers. Performing these updates is mandatory. Which type of document is Chris writing?

Procedure

To capture ethernet-based frames addressed to any/all IP addresses on a LAN segment, you need to use Wireshark in_____.

Promiscuous

Which term describes the level of exposure to some event that has an effect on an asset, usually the likelihood that something bad will happen to an asset?

Risk

When creating a new Group in Active Directory, the Group ______ setting is used to define how and where a group can assign or be assigned permissions.

Scope

Tomahawk Industries develops weapons control systems for the military. The company designed a system that requires two different officers to enter their access codes before allowing the system to engage. Which principle of security is this following?

Separation of duties

In which type of attack does the attacker attempt to take over an existing connection between two systems?

Session hijacking

Which element of the IT security policy framework provides detailed written definitions for hardware and software and how they are to be used?

Standard

Which of the following is not a security control that can be configured by the Group Policy Management Console (GPMC)?

Static routes

Which Layer 2 device does not count as a hop in traceroute output?

Switch

Which domain contains critical systems and applications that support and provide various services that perform core functions like authentication, authorization, and data management?

System/Application Domain

Which of the following is not an example of store-and-forward messaging?

Telephone call

True or False: A degausser creates a magnetic field that erases data from magnetic storage media.

True

True or False: A disaster recovery plan (DRP) is part of a business continuity plan (BCP) and is necessary to ensure the restoration of resources required by the BCP to an available state.

True

True or False: A network protocol governs how networking equipment interacts to deliver data across the network.

True

True or False: A smart card is an example of a logical access control.

True

True or False: A unified threat management (UTM) device can provide content inspection, where some or all network packet content is inspected to determine whether the packet should be allowed to pass.

True

True or False: Changes to external requirements, such as legislation, regulation, or industry standards, that require control changes can result in a security gap for an organization.

True

True or False: Hypertext Transfer Protocol (HTTP) is the communications protocol between web browsers and websites with data in cleartext.

True

True or False: If a company informs employees that email sent over the company's network is monitored, the employees can no longer claim to have an expectation of privacy.

True

True or False: Impact refers to the amount of risk or harm caused by a threat or vulnerability that is exploited by a perpetrator.

True

True or False: In a browser or uniform resource locator (URL) hijacking attack, users are directed to websites other than what they requested, usually to fake pages that attackers have created.

True

True or False: In a masquerade attack, one user or computer pretends to be another user or computer.

True

True or False: Internet of Things (IoT) upgrades can be difficult to distribute and deploy, leaving gaps in the remediation of IoT devices or endpoints.

True

True or False: Posting a comment on social media is an example of real-time communication.

True

True or False: Remote wiping is a device security control that allows an organization to remotely erase data or email in the event of loss or theft of the device.

True

True or False: Transmission Control Protocol/Internet Protocol (TCP/IP) is a suite of protocols that operates at both the Network and Transport layers of the Open Systems Interconnection (OSI) Reference Model.

True

True or False: Vendors or service providers that have remote access to an Internet of Things (IoT) device may be able to pull information or data from your device without your permission.

True

True or False: When servers need operating system upgrades or patches, administrators take them offline intentionally so they can perform the necessary work without risking malicious attacks.

True

True or False? A challenge created by the Internet of Things (IoT) is how to protect personal identity and private data from theft or unauthorized access.

True

True or False? Anti-malware programs and firewalls cannot detect most phishing scams because the scams do not contain suspect code.

True

True or False? Authentication by action is based on something you do, such as typing.

True

True or False? Authentication controls include passwords and personal identification numbers (PINs).

True

True or False? Common methods used to identify a user to a system include username, smart card, and biometrics.

True

True or False? Cryptography is the practice of making data unreadable.

True

True or False? Each layer of the Open Systems Interconnection (OSI) Reference Model needs to be able to talk to the layers above and below it.

True

True or False? Metadata of Internet of Things (IoT) devices is sometimes sold to companies seeking demographic marketing data about users and their spending habits.

True

True or False? Networks, routers, and equipment require continuous monitoring and management to keep wide area network (WAN) service available.

True

True or False? Not all risks are inherently bad; some risks can lead to positive results.

True

True or False? Single sign-on (SSO) can provide for greater security because with only one password to remember, users are generally willing to use stronger passwords.

True

True or False? Smart cities can monitor and report on real-time traffic conditions using Internet of Things (IoT) technology.

True

True or False? The ownership of Internet of Things (IoT) data, as well as the metadata of that data, is sometimes in question.

True

True or False? The recovery time objective (RTO) expresses the maximum allowable time in which to recover the function after a major interruption.

True

True or False? The term "risk management" describes the process of identifying, assessing, prioritizing, and addressing risks.

True

True or False? The tools for conducting a risk analysis can include the documents that define, categorize, and rank risks.

True

An attacker attempting to break into a facility pulls the fire alarm to distract the security guard manning an entry point. Which type of social engineering attack is the attacker using?

Urgency

In which domain of a typical IT infrastructure is the first layer of defense for a layered security strategy?

User Domain

Cloud Service Providers (CSPs) use the _______ to offer services to customers throughout the world.

WAN Domain

The Data Link Layer organizes bits into collections called ______, while the Network Layer encapsulates that information into units called ______.

frames; packets

Wireshark can be filtered to show ______ data by applying the ______ filter.

ping; ICMP

A ______ is used to identify the part of an Ethernet network where all hosts share the same host address.

subnet mask

On early Ethernet networks, all computers were connected to a single wire, forcing them to take turns on a local area network (LAN). Today, this situation is alleviated on larger networks because each computer has a dedicated wire connected to a _______ that controls a portion of the LAN.

switch

A ______ is limited to the scanning and enumeration phase of the cyber kill chain, while a ______ encompasses the full kill chain.

vulnerability assessment; penetration test


संबंधित स्टडी सेट्स

CH 9 LEARN SMART MANAGERIAL ACCOUNTING

View Set

Unity Test Questions Part 2 51-100

View Set

Exponential Growth Functions: Assignment

View Set

APC EEC 4.4-4.6 (ATMOSPHERE, WIND, WATERSHEDS)

View Set

PassPoint - Psychosocial Integrity

View Set

OCEAN MARINE BIO END OF YEAR FINAL STUDY GUIDE

View Set

Cognitive Psychology Chapter 12 Book Questions

View Set