Cyber Security

Ace your homework & exams now with Quizwiz!

Which of the following security vulnerabilities could result in the receipt of malicious information that could force a program to behave in an unintended way?

Non-validated input

An individual user profile on a social network site is an example of an _______ identity.

Online

How can you keep your personal browsing history hidden from other users on a shared computer?

Operate the web browser in private browser mode

You are looking to print photos that you have saved on a cloud storage account using a third-party online printing service. After successfully logging into the cloud account, you are automatically given access to the third-party online printing service. What allowed this automatic authentication to occur?

The cloud storage service is an approved application for the online printing service

What is the primary goal of a DoS attack?

To prevent the target server from being able to handle additional requests

Which of the following characteristics describe a worm? Select two correct answers

Travels to new computers without any intervention or knowledge of the user and Is self-replicating

'Securing physical access to target equipment is an organization's best defense against a cyber attack.' Is this true or false?

True

Which of the following is a key motivation of a white hat attacker?

Discovering weaknesses of networks and systems to improve the security level of these systems

What is the only way of ensuring that deleted files on your computer are irrecoverable?

Physically destroying your computer's hard drive

What tool is used to lure an attacker?

Honeypot

What tool can identify malicious traffic by comparing packet contents to known attack signatures?

IDS

Which of the following should be carried out to address known software vulnerabilities of a specific application?

Install a security patch

Which of the following examples illustrates how malware might be concealed?

An email is sent to the employees of an organization with an attachment that looks like an antivirus update, but the attachment actually consists of spyware

What do you call a program written to take advantage of a known security vulnerability?

An exploit

What is the last stage of a pen test?

Analysis and reporting

Which type of technology can prevent malicious software from monitoring user activities, collecting personal information and producing unwanted pop-up ads on a user computer?

Antispyware

what is the private browser called?

Incognito

What is the best method to prevent Bluetooth from being exploited?

Always disable Bluetooth when it is not being used

Which technology removes direct equipment and maintenance costs from the user for data backups?

A cloud service

A set of changes done to any program or application with the aim of updating, fixing or improving it is often referred to as what?

A patch

Which of the statements correctly describes cybersecurity?

Cybersecurity is the ongoing effort to protect individuals, organizations and governments from digital attacks

What can the skills developed by cybersecurity professionals be used for?

Cybersecurity professionals develop many skills that can be used for good or evil

What is the difference between a hacker and a cybersecurity professional?

Cybersecurity professionals must work within legal boundaries

Which of the following statements describes cyberwarfare?

Cyberwarfare is an Internet-based conflict that involves the penetration of information systems of other nations

Which of the following methods can be used to ensure confidentiality of information? Choose three correct answers

Data encryption and Two-factor authentication

Which of the following methods can be used to ensure confidentiality of information? Choose three correct answers

Data encryption, Two-factor authentication, Username ID and password

'Today, there are single security appliances that will solve all the network security needs of an organization.' Is this statement true or false?

False

What name is given to a device that controls or filters traffic going in or out of the network?

Firewall

What are the foundational principles for protecting information systems as outlined in the McCumber Cube? Choose three correct answers

Integrity, Availability, Confidentiality

Why might internal security threats cause greater damage to an organization than external security threats?

Internal users have direct access to the infrastructure devices

Why do IoT devices pose a greater security risk than other computing devices on a network?

Most IoT devices do not receive frequent software updates

What type of attack allows an attacker to use a brute-force approach?

Password cracking

Which configuration on a wireless router is not considered to be adequate security for a wireless network?

Preventing the broadcast of an SSID

What should you do in order to make sure that people you live with do not have access to your secure data?

Set up password protection

Which of the following tools can perform real-time traffic and port analysis, and can also detect port scans, fingerprinting and buffer overflow attacks?

Snort

Which of the following pieces of information would be classified as personal data? Choose 3

Social security number, Driver license number, Date and place of birth

Which of the following is an example of two factor authentication?

Your fingerprint and your password

Your neighbor tells you that they don't have an online identity. They have no social media accounts and only use the Internet to browse. Is your neighbor right?

no


Related study sets

Bontrager ch.10 Bony Thorax, Pediatric Positioning Chapter 16 self test, Bontrager Chapter 16, Ch 14: Urinary System & Venipuncture self test only, bontrager ch. 14, Chapter 13 Lower Gastrointestinal System: Self Test, Lower GI System - Chapter 13 Bo...

View Set

Aftermath of World War II and beginning of the Cold War

View Set

Chapter 13: Anatomy and Physiology of Pregnancy, Chapter 14 OB, OB chapter 15

View Set

Anti-Money Laundering - Ethical Decision Making for Insurance Producers

View Set

Chapter 12: Mobile Device Forensics and the Internet of Anything

View Set