Cisco Cybersecurity Final Exam
What is at risk if a patient receives email about a medical visit?
Patient records
Best method to avoid getting spyware on a machine
use trusted websites
Replicates itself independently
Worm
DDoS
Abnormally high number of web pages requests
Add a couple more web servers because of too many requests
Availability
Voice recognition and fingerprint
Biometrics
An employee does something as a company representative with the knowledge of that company
Company is legally responsible
Require users to authenticate first before accessing certain web pages
Confidentiality
Action taken by an IDS upon detection of malicious traffic
Create a network alert and log the detection
A planned process of cyberattack
Cyber Kill Chain
Effort to protect Internet-connected systems from unauthorized use or harm
Cybersecurity
Gain advantage over adversaries
Cyberwarfare
Attack that uses zombies
DDoS
Data is unaltered during transit is not changed by unauthorized entities
Data Integrity
For what purpose would a network administrator use the Nmap tool?
Detection and identification of open ports
Tool used to lure an attacker so that an administrator can analyze the attack
Honeypot
Two tools used for incident detection
Intrusion detection system & netflow
Prevent a compromised IoT device from maliciously accessing data local network
Place on isolated network
Stage of the kill chain used to focus on the selection of targets
Reconnaissance
one main function of the Cisco Security Incident Response Team
To ensure company, system, and data preservation
Replicates itself by attaching to another file
Virus
A user logs in to a desired web application using social media credentials
open Authentication