Cybersecurity Level 2 Study Guide

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

What age group is currently experiencing the most growth in terms of social media use? - 34-40 - 50 and over - 18-25 - 12 and under

50 and over

What age group is currently experiencing the most growth in terms of social media use? - 50 and over - 12 and under - 18-25 - 34-40

50 and over

What percentage of U.S. job recruiters have rejected candidates based on their online reputation. - 50 - 40 - 80 - 70

70

What is the character associated with the binary number 100 0000? - @ - # - $ - &

@

Complete the statement with a choice below: Improved performance is achieved, because on a segmented network there are fewer hosts per sub-network, thus minimizing local ______________-. - traffic - phishing - congestion - privacy laws

traffic

Which type of threat consists of mostly inexperienced individuals using easily available hacking tools such as shell scripts and password crackers? - unstructured threats - structured threats - external threats - internal threats

unstructured threats

Select the missing word: Segmenting allows ________________ access to the network to be controlled by implementing VLANs to segregate the network. - visitor - clients - no one - hosts

visitor

Match the type of topology with it's correct definition. - when a node is seen by another node as if it is connected directly. There might be some intermediate devices but each node on either side is unaware of intermediate layers. - Peer to peer - when there is a single and a common communication channel on which all nodes are connected with terminators on both ends to absorb signals. - Bus - the arrangement of nodes where there is a central node from which all other nodes are connected. - Star - the sequence of all nodes connected, one gets connection from the preceding node and the first node is the last node which makes a cycle . - Ring - the arrangement of nodes based on levels or layers. There is always one node at the button of the network (root node), below this level is another level of nodes (which all share the same parent), and below each of those nodes are other nodes. At each level, there is one root node when combined with its children they form a star topology. - Tree - the arrangement of nodes in such a way that each node in the network is connected to the rest of the other nodes. - Mesh - the implementation of two or more topologies together to form a network. - Hybrid

when a node is seen by another node as if it is connected directly. There might be some intermediate devices but each node on either side is unaware of intermediate layers. - Peer to peer - when there is a single and a common communication channel on which all nodes are connected with terminators on both ends to absorb signals. - Bus - the arrangement of nodes where there is a central node from which all other nodes are connected. - Star - the sequence of all nodes connected, one gets connection from the preceding node and the first node is the last node which makes a cycle . - Ring - the arrangement of nodes based on levels or layers. There is always one node at the button of the network (root node), below this level is another level of nodes (which all share the same parent), and below each of those nodes are other nodes. At each level, there is one root node when combined with its children they form a star topology. - Tree - the arrangement of nodes in such a way that each node in the network is connected to the rest of the other nodes. - Mesh - the implementation of two or more topologies together to form a network. - Hybrid

Cyber-vetting can be defined as.... - where interviewers cannot research applicants based on their online activities - where interviewers could research applicants based on their online activities - where applicants cannot research prospective employers based on their online activities. - where applicants could research prospective employers based on their online activities.

where interviewers could research applicants based on their online activities

A type of website that can be created collaboratively or modified by different users is called a __________________. - wiki - podcast - forum - blog

wiki

Networks that do not need a physical communication link are called ____________ networks - wireless - wired - PAN - confidential

wireless

Match each of the following binary numbers with its decimal equivalent. - 0101 1010 - 90 - 0101 0101 - 85 - 1010 1010 - 170

0101 1010 - 90 0101 0101 - 85 1010 1010 - 170 (SKIP !!)

Match each of the following decimal numbers with its binary equivalent. - 15 - 0000 1111 - 45 - 0010 1101 - 131 - 1000 0011

15 - 0000 1111 45 - 0010 1101 131 - 1000 0011 (SKIP BECAUSE TEST MAY HAVE DIFFERENT NUMBERS.)

People have been using social media to communicate since the __________ . - 1930's - 1970's - 1990's - 2000's

1970's

In what year was the "World Wide Web" born? - 1990 - 1989 - 1994 - 1991

1990

In what year was the "World Wide Web" born? - 1994 - 1990 - 1991 - 1989

1990

Which of the following technological advancements was HP's first computer? - 2116A - 2252B - Mark 1 - Univac 1

2116A

How many blogs are on Tumblr? - 217,000,000,000 - 217,000 - 217,000,000 - 2,170

217,000,000

Match each of the following decimal numbers with its binary equivalent. - 3 - 0000 0011 - 240 - 1111 0000 - 55 - 0011 0111

3 - 0000 0011 240 - 1111 0000 55 - 0011 0111 (SKIP LOL)

What percent of college admissions officers found something online that had a negative impact on their evaluation of a student? - 38 - 50 - 48 - 25

38

The MAC addresses of wireless clients can't truly be changed because they're encoded in the hardware. - True - False

True

Match the common Protocol with the layer it coincides with. - Transport Layer - TCP - Internet Layer - IP(IPv4, IPv6) - Link Layer - ARP - Application Layer - DNS - Application Layer - SMTP

- Transport Layer - TCP - Internet Layer - IP(IPv4, IPv6) - Link Layer - ARP - Application Layer - DNS - Application Layer - SMTP

Please match the vocabulary word with the corresponding definition. - full-fledged production systems. The activities of the attacker are monitored by using a bug tap that has been installed on the honeypot's link to the network. - pure honeypots - imitate the activities of the production systems that host a variety of services and, therefore, an attacker may be allowed a lot of services to waste their time. - high-interaction honeypots - simulate only the services frequently requested by attackers. Since they consume relatively few resources, multiple virtual machines can easily be hosted on one physical system. - low-interaction honeypots

- full-fledged production systems. The activities of the attacker are monitored by using a bug tap that has been installed on the honeypot's link to the network. - pure honeypots - imitate the activities of the production systems that host a variety of services and, therefore, an attacker may be allowed a lot of services to waste their time. - high-interaction honeypots - simulate only the services frequently requested by attackers. Since they consume relatively few resources, multiple virtual machines can easily be hosted on one physical system. - low-interaction honeypots

Which bank in the UK is thought to be the first to put an Automated Teller Machine (ATM) into operation? - Barclay's Bank - Capital One Bank - J.P. Morgan - The Federal Reserve

Barclay's Bank

Which bank in the UK is thought to be the first to put an Automated Teller Machine (ATM) into operation? - J.P. Morgan - Barclay's Bank - Capital One Bank - The Federal Reserve

Barclay's Bank

A way for individuals to share information and express opinions about any number of subjects online is a social media platform called a __________. - Blog - Facebook - Twitter - Forum

Blog (???)

Match the social media network with the type of social media platform it is.

Blog - Tumblr Video - YouTube Photo Sharing - Instagram

The biggest future threat to information security in the future may be the lack of skilled and educated professionals in the industry. - True - False

True

Which protocol dynamically assign unique IP addresses to every machine connected to a network and ensures no IP conflict? - DHCP - IP - ARP - HTTP

DHCP

Which protocol dynamically assigns unique IP addresses to every machine connected to a network and ensures no IP conflict? - DHCP - IP - ARP - HTTP

DHCP

In 1952, the UNIVAC correctly predicted the outcome of the presidential election while selecting which man as the new President? - Adlai Stevenson - Dwight D. Eisenhower - Harry S. Truman - Ronald Reagan

Dwight D. Eisenhower

Which of the following is NOT a type of social media? - Blogs - Podcasts - Forums - Email

Email

The unicodes will not only include _________________ symbols, but also symbols found in other languages. - English - French - British - Latin

English

What is the most popular social media platform on the web today? - Facebook - Linkedln - Pinterest - Twitter

Facebook

A web server is a computer that provides World Wide Web (WWW) services on only the ring topology. It includes the hardware, operating system, Web server software, and Web site content (Web pages). If the Web server is used internally and not by the public, it may be known as an "intranet server". - True - False

False

By definition, forums are open to only select members. - True - False

False

IP address assignments are always on a static basis. - True - False

False

Individual privacy may be more protected as governments and law enforcement agencies aggressively monitor email and personal communication. - True - False

False

Most networks are dominated by Ethernet and/or Web Server protocol. - True - False

False

The first widespread social media platform was? - Friendster - MySpace - Facebook - Twitter

Friendster

This toy caused a 1998 holiday buying frenzy due to its communication with other toys like it using an infrared port between its eyes. - Furby - Tickle Me Elmo - Nintendo Gameboy - Nintendo Switch

Furby

This toy caused a 1998 holiday buying frenzy due to its communication with other toys like it using an infrared port between its eyes. - Furby - Tickle Me Elmo - Nintendo Switch - Nintendo Gameboy

Furby

This scientist built the "Model K" Adder on his kitchen table. It provided proof of concept for applying Boolean logic to the design of computers. - Ted Kaczynski - Alan Turing - George Stibitz - Konrad Zuse

George Stibitz

Which of the following technological advancements, built by Westinghouse, responded to voice commands and had pre-recorded wisecracks on 78 rpm records? - the Elektro - the Z3 computer - the Interpolator - the Colossus

the Elektro

Which social media platform is considered a business version of Facebook? - LinkedIn - Google+ - Pinterest - Twitter

LinkedIn

Which social media platform is considered a business version of facebook? - LinkedIn - Google+ - Pinterest - Twitter

LinkedIn

In the early 1980s a group of six teenagers were arrested for hacking into 60 different computer networks and were nicknamed the ...................... - Milwaukee 414s - Milwaukee Fonzis - Milwaukee 501s - Milwaukee Computer Kids (MCKs)

Milwaukee 414s

In 1992, Apple launched the first hand held "Personal Data Assistant" and named it after this famous scientist. - Newton - Pascal - Gates - Suzuki

Newton

Which technological advancement, whose debut, was the first electronic duplication of the human vocal tract on a single integrated circuit? - Speak & Spell - Elektro - Macintosh - Nintendo

Speak & Spell

Which of these is not a way to protect your digital reputation? - Search yourself — type your name into a search engine and see what comes up. If youterm-1 find things that you thought were private, check your privacy settings. - Stop and think about any content before you post or send. - Treat others online as you would like to be treated. - Highlight attractive traits and qualities.

Search yourself — type your name into a search engine and see what comes up. If you find things that you thought were private, check your privacy settings.

Which of the following technological advancements was the center of a patent dispute and created at Iowa State College(now University)? - The Atanasoff-Berry Computer (ABC) - the Elektro - the Model K Adder - the Complex Number Calculator

The Atanasoff-Berry Computer (ABC)

The DNS(Domain Name Service) act as translators for us. - True - False

True

A buffer is a dedicated portion of the printer's memory where information is held before being processed. - True - False

True

A web browser is client software used to view Web content. - True - False

True

Apple's inspiration for the Lisa and Macintosh computers came from the Xerox Alto. - True - False

True

Digital footprints are used by marketers in order to find what products a user is interested in or to inspire ones' interest in a certain product based on similar interests. - True - False

True

Networks that use a physical communication link such as fiber optic cables are called wired networks. - True - False

True

Segmenting limits the effect of local failures on other parts of the network. - True - False

True

Social media is a useful tool for job-seekers. - True - False

True

Taking steps to increase personal data security, limiting data exposure and sharing information about online threats is one-way personal information security has evolved. - True - False

True

Which U. S. military branch research group developed the first modem? - U. S. Navy - U. S. Air Force - U. S. Army - U. S. Marines

U. S. Air Force

A _________________ creates a secure connection between two networks over the internet. - VPN - IPSec - OpenSSL - DMZ

VPN

A computer program or a device that provides functionality for other programs or devices is referred to as.... - a server. - a client. - a node. - a web browser.

a server.

The definition of client is ...... - a system entity, usually a computer process acting on behalf of a human user, that makes use of a service provided by a server. - a computer program or a device that provides functionality for other programs or devices. - a network that use a physical communication link such as fiber optic cables. - a network that use no physical connections between the nodes.

a system entity, usually a computer process acting on behalf of a human user, that makes use of a service provided by a server.

This term is created when personal data is released deliberately by the user for the purpose of sharing information about oneself by means of websites or social media. - passive digital footprint - cyber-vetting - digital footprint - active digital footprint

active digital footprint

Which of these is NOT a use for packet or protocol analyzers? - allowing network problems to be dealt with by the anti-virus software installed on the machine - isolating network problems - debugging network protocol - detecting network misuse by internal and external users

allowing network problems to be dealt with by the anti-virus software installed on the machine

A digital dossier is ...... - an accumulation of all the digital tracks you leave behind. - an accumulation of only the active digital footprint you leave behind. - an accumulation of only the passive digital foot print you leave behind. - an accumulation of the photos you place on various social media platforms.

an accumulation of all the digital tracks you leave behind.

Which of the following has not been attributed, at least in part, to social media? - depression - drug addiction - kidnapping - murder

drug addiction

The definition, a method of routing in networks that is based on hierarchical addressing refers to which term? - hierarchical routing - hierarchical networking - hierarchical servers - hierarchical queries

hierarchical routing

Complete the statement with a choice below: By creating network segments containing only the resources specific to the consumers that you authorize access to, you are creating an environment of ___________ privilege. - least - most - equal - unequal

least

Podcasts are a type of social media that is experienced primarily through.... - listening - reading - watching - podcasts are not considered social media

listening

What portion of companies use social media to locate new employees? - nearly all - about 1/3 - about 1/2 - about 2/3

nearly all

Any device (for example, computer, printer, server) connected to a network, either as an endpoint (that is, a point where the communication link terminates) or some intermediary point (that is, a point which lies between endpoints on a communication link) is called a _________________. - node - wireless network - server - client

node

On what level has social media connected us to one another? - on a global level - on a national level - on a state level - on a community level

on a global level

Data collected without the user knowing is referred to as one's .... - passive digital footprint - digital footprint - active digital footprint - cyber-vetting

passive digital footprint

While digital footprint can be used to infer personal information, such as demographic traits, sexual orientation, race, religious and political views, personality, or intelligence without individuals' knowledge, it also exposes individuals' private _____________________ sphere into the social sphere. - emotional - spiritual - physical - psychological

psychological

The two most basic methods to design a network with a DMZ, are with a _______________ firewall or with _______________ firewalls. Choose two answers. - single - dual - double - isolated - sensitive

single dual

What determines how much data traffic a router can handle? - size - age - brand - location

size

What determines how much data traffic a router can handle? - size - brand - age - color

size

Any online conduit for communicating with companions or associates is referred to as _______________________ . - social media - forums - social engineering - blogs

social media

Websites or apps that allow you to communicate and share information are known as .... - social media networks - blogs - forums - wikis

social media networks

Installing a ________________ in between your firewall and network allows you to install a dedicated IDS, which protects your devices and allows them to continue working at full speed. - switch - malware detector - honeypot - intrusion detection system

switch

In a recursive name query, ...... - the DNS client requires that the DNS server responds to the client with either the requested resource record or an error message stating that the record or domain name does not exist. - a DNS client allows the DNS server to return the best answer it can give based on its cache or zone data - it is referred to as a method of routing in networks that is based on hierarchical addressing.. - the arrangement of nodes are based on levels or layers. There is always one node at the button of the network (root node), below this level is another level of nodes (which all share the same parent), and below each of those nodes are other nodes. At each level, there is one root node when combined with its children they form a star topology.

the DNS client requires that the DNS server responds to the client with either the requested resource record or an error message stating that the record or domain name does not exist.

Which of the following technological advancements, built by Westinghouse, responded to voice commands and had pre-recorded wisecracks on 78 rpm records? - the Colossus - the Elektro - the Z3 computer - the Interpolator

the Elektro


संबंधित स्टडी सेट्स

OEA Study guide - Social Studies

View Set

SUA Honors Chemistry 2014 Final exam

View Set

Physiology: Immune System Part 2

View Set

MKTG 300 - Exam 1 Review (Ch 1-3)

View Set

CHAPTER 1 TEST QUESTIONS AND ANSWERS!!!!

View Set

Childhood Disorders Final Exam (PAST CHAPTERS)

View Set