Final 1

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

True

'Cybersecurity certifications are a way for you to verify your skills and knowledge and can also boost your career.' Is this statement true or false?

Patient records

A medical office employee sends emails to patients about their recent visits to the facility. What information would put the privacy of the patients at risk if it was included in the email?

There was no reply from the host

A port scan returns a 'dropped' response. What does this mean?

Unethical

An employee is laid off after fifteen years with the same organization. The employee is then hired by another organization within a week. In the new organization, the employee shares documents and ideas for products that the employee proposed at the original organization. Is the employee's behavior ethical or unethical?

Availability

An organization is experiencing overwhelming visits to a main web server. You are developing a plan to add a couple of more web servers for load balancing and redundancy. Which requirement of information security is addressed by implementing the plan?

Advanced persistent threat

Carrying out a multi-phase, long-term, stealthy and advanced operation against a specific target is often referred to as what?

Ethical

During a meeting with the Marketing department, a representative from IT discusses features of an upcoming product that will be released next year. Is this employee's behavior ethical or unethical?

Weaknesses in security practices

If developers attempt to create their own security algorithms, it will likely introduce what type of vulnerabilities?

Access control problems

Improper management of physical access to a resource, such as a file, can lead to what type of security vulnerability?

Unethical

One of your colleagues has lost her identification badge. She is in a hurry to get to a meeting and does not have time to visit Human Resources to get a temporary badge. You lend her your identification badge until she can obtain a replacement.Is this behavior ethical or unethical?

Data is unaltered during transit Data is not changed by unauthorized entities

What are the objectives of ensuring data integrity? (Choose two correct answers)

Spectre Meltdown

What do you call the vulnerabilities discovered by Google security researchers that affect almost all CPUs released since 1995? (Select two correct answers)

Install software only from trusted websites

What is the best way to avoid getting spyware on a machine?

To ensure company, system and data preservation

What is the main function of the Cisco Security Incident Response Team?

To gain advantage over adversaries

What is the main purpose of cyberwarfare?

Blockchain Ledger

What names are given to a database where all cryptocurrency transactions are recorded? (Select two correct answers)

Brute force attack Rainbow tables Spraying Dictionary attack

What of the following are examples of cracking an encrypted password? (Choose four correct answers)

Race conditions

What vulnerability occurs when the output of an event depends on ordered or timed outputs?

A virus replicates itself by attaching to another file, whereas a worm can replicate itself independently.

When describing malware, what is a difference between a virus and a worm?

CompTIA Security+

Which of the following certifications meets the U.S. Department of Defense Directive 8570.01-M requirements, which is important for anyone looking to work in IT security for the federal government?

EC Council Certified Ethical Hacker

Which of the following certifications tests your understanding and knowledge in how to look for weaknesses and vulnerabilities in target systems using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner?

Reverse proxy server

Which of the following firewalls are placed in front of web services to protect, hide, offload and distribute access to web servers?

Network layer firewall

Which of the following firewalls filters traffic based on source and destination IP addresses?

Context aware application firewall

Which of the following firewalls filters traffic based on the user, device, role, application type and threat profile?

Proxy server

Which of the following firewalls filters web content requests such as URLs and domain names?

Network address translation firewall

Which of the following firewalls hides or masquerades the private addresses of network hosts?

Palo Alto Networks Certified Cybersecurity Associate

Which of the following is an entry-level certification for newcomers who are preparing to start their career in cybersecurity?

Fingerprint Voice recognition

Which of the following security implementations use biometrics? (Choose two correct answers)

Open authorization

Which technology creates a security token that allows a user to log in to a desired web application using credentials from a social media website?

Confidentiality

You are configuring access settings to require employees in your organization to authenticate first before accessing certain web pages. Which requirement of information security is addressed through this configuration?

If the laptop requires user authentication for file and media sharing

You are surfing the Internet using a laptop at a public Wi-Fi cafe. What should you check first before you connect to the public network?


Set pelajaran terkait

Insurance Interest and Perfection of the Contract of Insurance (Recitation)

View Set

CS, Algorithms, and Data Structures

View Set

Medicine in America Final Multiple Choice

View Set

Chapter 6 Section 3 Reading Guide

View Set

B.Arab = Terjemahan surat Al-fatihah

View Set