course final exam

Ace your homework & exams now with Quizwiz!

True or False:An advanced persistent threat (APT) is usually well-funded.

True

An employee is laid off after fifteen years with the same organization. Another organization then hires the employee within a week. In the new organization, the employee shares documents and ideas for products that the employee proposed at the original organization. Is the employee's behavior ethical or unethical?

Unethical

Which firewall filters traffic based on source and destination data ports, including connection states?

transport layer firewall

What are two security implementations that use biometrics? (Choose two.)

voice recognition and fingerprint

What is an example of the Cyber Kill Chain?

a planned process of cyberattack

A company is experiencing overwhelming visits to a main web server. The IT department is developing a plan to add a couple more web servers for load balancing and redundancy. Which requirement of information security is addressed by implementing the plan?

availability

Which activity typically happens at the first stage of a penetration test?

conducting passive or active reconnaissance and vulnerability research

A web server administrator is configuring access settings to require users to authenticate first before accessing certain web pages. Which requirement of information security is addressed through the configuration?

confidentiality

For what purpose would a network administrator use the Nmap tool?

detection and identification of open ports

What is one main function of the Cisco Security Incident Response Team?

to ensure company, system, and data preservation

When describing malware, what is a difference between a virus and a worm?

A virus replicates itself by attaching to another file, whereas a worm can replicate itself independently.

A security technician configures access settings to require employees to authenticate before accessing certain web pages. Which requirement of information security is addressed through this configuration?

Confidentiality

What type of attack uses zombies?

DDoS

During a meeting with the Marketing department, a representative from IT discusses features of an upcoming product that will be released next year. Is this employee's behavior ethical or unethical?

Ethical

True or False:Internet-based cameras and gaming gear are not subject to security breaches.

False

Which term describes the private browser mode for Google Chrome?

Incognito

All IoT devices are potentially vulnerable to security breaches. What is the best approach for preventing an IoT device from becoming compromised and maliciously accessing data and devices on a local network?

Install a software firewall on every network device.

What is the best method to avoid getting spyware on a machine?

Install software only from trusted websites.

Which statement describes cybersecurity?

It is an ongoing effort to protect Internet-connected systems and the data associated with those systems from unauthorized use or harm.

Which type of firewall hides or masquerades the private address of network hosts?

NAT firewall

What type of infiltration method allows attackers to quietly capture two-step verification SMS messages sent to users in a Man-in-the-Mobile (MITMO) attack?

On-Path attack

What tool is used to lure an attacker so that an administrator can capture, log, and analyze the behavior of the attack?

honeypot

Which two tools used for incident detection can be used to detect anomalous behavior, to detect command and control traffic, and to detect infected hosts? (Choose two.)

intrusion detection system and NetFlow

What are two examples of on-path attacks? (Choose two.)

man-in-the-middle man-in-the-mobile

What are three states of data? (Choose three.)

processing, storage, transmission

An attacker requests personal information from a person in exchange for a gift. Identify the infiltration method.

quid pro quo

Which type of software vulnerability describes a situation where the required ordered events do not occur in the correct order?

race conditions

Which stage of the kill chain used by attackers focuses on the identification and selection of targets?

reconnaissance

An operating system-style window pops up on a Windows user screen. The pop-up message warns the user that the system is at risk and that a specific program needs to run to return the system to routine operation. Name the kind of malware used.

scareware

What are four examples of cracking an encrypted password? (Choose four.)

spraying dictionary attack rainbow tables brute force attack


Related study sets

Ch. 1 and 4 back of book questions

View Set

Learning Dynamic Study Module Chapter 22

View Set

Delmars Unit 21 Resistive-Capacitive Series Circuits

View Set

Ch 10 - Operations Management: Goods and Services

View Set