Cyber-security Essentials Study Guide

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

An organization wants to adopt a labeling system based on the value, sensitivity, and criticality of the information. What element of risk management is recommended?

Asset classification

A specialist in the HR department is invited to promote the cybersecurity program in community schools. Which three topics would the specialist emphasize in the presentation to draw students to this field? ((looking for three.)

It has a high earning potential, it's a challenging career as well as highly portable, and it's a service to the public

What approach to availability provides the most comprehensive protection because multiple defenses coordinate together to prevent attacks?

Layering

What Windows utility should be used to configure password rules and account lockout policies on a system that is not part of a domain?

Local Security Policy tool

A penetration testing service hired by the company has reported that a backdoor was identified on the network. What action should the organization take to find out if systems have been compromised?

Look for unauthorized accounts

What is a nontechnical method that a cybercriminal would use to gather sensitive information from an organization?

Man in the middle

Which of the following products or technologies would you use to establish a baseline for an operating system?

Microsoft Security Baseline Analyzer

Which type of networks poses increasing challenges to cybersecurity specialists due to the growth of BYOD on campus?

Mobile devices/Wireless network poses increasing challenges.

A VPN will be used within the organization to give remote users secure access to the corporate network. What does IPsec use to authenticate the origin of every packet to provide data integrity checking?

Multilevel feedback queue

Which national resource was developed as a result of a U.S. Executive Order after a ten-month collaborative study involving over 3,000 security professionals?

NIST framework

Which type of cybercriminal attack would interfere with established network communication through the use of constructed packets so that the packets look like they are part of the normal communication?

Packet Forgery

Passwords, passphrases, and PINs are examples of which security term?

Passphrase

Keeping data backups offsite is an example of which type of disaster recovery control?

Preventive

The team is in the process of performing a risk analysis on the database services. The information collected includes the initial value of these assets, the threats to the assets and the impact of the threats. What type of risk analysis is the team performing by calculating the annual loss expectancy?

Quantitative Risk Analysis

What type of attack will make illegitimate websites higher in a web search result list?

SEO poisoning

You have been asked to implement a data integrity program to protect data files that need to be electronically downloaded by the sales staff. You have decided to use the strongest hashing algorithm available on your systems. Which hash algorithm would you select?

SHA-256

Which two protocols pose switching threats? (Two Protocols.)

STP, ARP

Which protocol would be used to provide security for employees that access systems remotely from home?

Secure Shell (SSH)

What is an impersonation attack that takes advantage of a trusted relationship between two systems?

Spoofing

Which data state is maintained in NAS and SAN services?

Stored data

You have been asked to describe data validation to the data entry clerks in accounts receivable. Which of the following are good examples of strings, integers, and decimals?

Strings are letter characters, integers are whole numbers like 2, decimals are like 0.26

The awareness and identification of vulnerabilities is a critical function of a cybersecurity specialist. Which of the following resources can be used to identify specific details about vulnerabilities?

The CVE national database

What is an example of early warning systems that can be used to thwart cybercriminals?

The Honeynet project.

Technicians are testing the security of an authentication system that uses passwords. When a technician examines the password tables, the technician discovers the passwords are stored as hash values. However, after comparing a simple password hash, the technician then discovers that the values are different from those on other systems. What are two causes of this situation? ((looking for two.)

The systems could either use different hashing algorithms or one algorithm could use hashing and salting

The IT department is tasked to implement a system that controls what a user can and cannot do on the corporate network. Which process should be implemented to meet the requirement?

firewall

Which utility uses the Internet Control Messaging Protocol (ICMP)?

ping

Being able to maintain availability during disruptive events describes which of the principles of high availability?

system resiliency

Which threat is mitigated through user awareness training and tying security awareness to performance reviews?

user-related threats

An organization allows employees to work from home two days a week. Which technology should be implemented to ensure data confidentiality as data is transmitted?

A VPN

Which algorithm will Windows use by default when a user intends to encrypt files and folders in an NTFS volume?

AES (Advanced Encryption Standard)

Which statement describes a characteristics of block ciphers?

Block ciphers result in output data that is larger than the input data most of the time.

In a comparison of biometric systems, what is the crossover error rate?

CER is the rate where false rejection rate and the false acceptance rate are equal

What are two incident response phases? (looking for two.)

Containment and recovery detection and analysis

A user has a large amount of data that needs to be kept confidential. Which algorithm would best meet this requirement?

Cryptography

Which access control strategy allows an object owner to determine whether to allow access to the object?

DAC

A cyber criminal sends a series of maliciously formatted packets to the database server. The server cannot parse the packets and the event causes the server crash. What is the type of attack the cyber criminal launches?

DOS

HVAC, water system, and fire systems fall under which of the cybersecurity domains?

Device Hardening

An organization just completed a security audit. Your division was cited for not conforming to X.509 requirements. What is the first security control you need to examine?

Digital Certificates

The X.509 standards defines which security technology?

Digital Certificates

What technology should you implement to ensure that an individual cannot later claim that he or she did not sign a given document?

Digital Signature

Which technology would you implement to provide high availability for data storage?

Direct-Attached Storage

Which technology could be used to prevent a cracker from launching a dictionary or brute-force attack off a hash?

HMAC

What three best practices can help defend against social engineering attacks? ((looking for three.)

Having a strong password, do not share personal information, and don't click on suspicious links

Which framework should be recommended for establishing a comprehensive information security management system in an organization?

ISO/IEC 27000

Which method is used by steganography to hide text in an image file?

Image Steganography

An executive manager went to an important meeting. The secretary in the office receives a call from a person claiming that the executive manager is about to give an important presentation but the presentation files are corrupted. The caller sternly recommends that the secretary email the presentation right away to a personal email address. The caller also states that the executive is holding the secretary responsible for the success of this presentation. Which type of social engineering tactic would describe this scenario?

Intimidation

Which risk mitigation strategies include outsourcing services and purchasing insurance?

Transfer

Which three protocols can use Advanced Encryption Standard (AES)? (looking for three protocols.)

WPA2/WPA/802.11i

An organization plans to implement security training to educate employees about security policies. What type of access control is the organization trying to implement?

administrative

A cybersecurity specialist is working with the IT staff to establish an effective information security plan. Which combination of security principles forms the foundation of a security plan?

confidentiality, Integrity, and availability


Set pelajaran terkait

FL rules for all lines/ Primerica

View Set

CH 5 - Ethics and Ethical Reasoning

View Set

Respiratory Alkalosis Practice Ques

View Set

COMM Law - Reno v. American Civil Liberties Union (ACLU)

View Set

Chapter 53: ASSESSMENT OF KIDNEY AND URINARY FUCTION

View Set