Cyber-security Final Exam
What is the main purpose of cyberwarfare?
To gain advantage over adversaries
What is the purpose of Packet Tracer?
To simulate and visualize one or more networks
Which tool would you use to grab and lift small objects?
3-prong holder
Cloud services
A collection of data centers or connected servers that provide anywhere anytime access to data and applications
Hadoop
A comprehensive ecosystem of open-source software for big data management
What device provides auto discovery services for smart devices that are connected to the network?
A home gateway
Which of the following statement about cleaning monitors and display devices is true?
A monitor should be powered off and cleaned with a lint free cloth.
You need to trace the route that a Cat 6 UTP cable takes through the ceiling and walls of your building. Which tool should you use?
A tone generator
When describing malware, what is a difference between a virus and a worm?
A virus replicates itself by attaching to another file, whereas a worm can replicate itself independently.
A PC technician knows he will be late to an appointment with a customer. Which of the following actions should the technician take?
Contact the customer and apologize and Give a realistic time frame for your arrival.
What action will an IDS take upon detection of malicious traffic?
Create a network alert and log the detection
You are providing telephone support for a user who is trying to connect a computer to a projector. You know that the projector only has a VGA port.
D-shaped with 15 pins
An employee does something as a company representative with the knowledge of that company and this action is deemed illegal. The company would be legally responsible for this action.
True
The IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which type of security attack is occurring?
DDoS
What type of attack uses zombies?
DDoS
You are helping a customer over the phone who needs to connect a monitor that uses a digital interface. Which port should you instruct her to look for on the back of her PC?
DVI
What are two things that all digital devices need in order to work?
Data and a Computer Program
What are two objectives of ensuring data integrity?
Data is unaltered during transit and Data is not changed by unauthorized entities.
Which of the following features should you look for when selecting a vacuum cleaner for your cleaning kit?
Non-static generating and One that blows well as vacuums
Which technology creates a security token that allows a user to log in to a desired web application using credentials from a social media website?
Open Authorization
With artificial intelligence, smart devices can modify processes and settings on the fly in response to changes on the network.
True
Which component of Windows prompts the user for credentials or permission to minimize the dangers of unintended software installations?
User Account Control (UAC)
You are trying to help a co-worker order a UPS for each PC in her remote office location. What rating is used to specify the size of a UPS?
VA
Which of the following is most helpful in keeping a computer cool?
Vacuum dust from the system regularly and Verify that cooing fans are not circulating air in the wrong directions.
What are two security implementations that use bio-metrics?
Voice Recognition and Fingerprint
Which operation system(s) include the following features? Cortana Cloud Storage Continuum Microsoft Store Microsoft Edge
Windows 10
Which tool would you use to measure electrical properties such as voltage, amps, and resistance?
Multimeter
What are loopback plugs used for?
Testing ports by returning output signals as input.
What is the largest network in existence?
The Internet
Which of the following is the term used for a set of programs that acts as an interface between the applications that are running on a computer and the computer's hardware?
The operating system
A Help Desk technician receives a call from a user who is unable to download new messages from the company's email server. The technician tells the user to open a command prompt and ping the email server and check the SMTP and POP3 server IP address.
The technician used jargon that the user probably didn't understand.
Which of the following items are likely to be displayed in the Notification Area of a computer running the Windows operating system?
Time and Volume
What is one main function of the Cisco Security Incident Response Team?
To ensure company, system, and data preservation
Multitasking
Ability to run multiple applications simultaneously.
Multithreading
Ability to run multiple parts of an application simultaneously.
Multiprocessing
Ability to use multiple processing devices.
Fog computing
An architecture that utilizes edge devices for data pre-processing and storage
While on a service call at a customer site, you are discussing the problem with the customer when your cell phone rings. You check the caller ID, and you see that the call is related to parts you ordered for another customer.
Ask the customer if they mind if you take the call, and then step into the hallway to briefly talk on the phone.
A company is experiencing overwhelming visits to a main web server. The IT department is developing a plan to add a couple more web servers for load balancing and redundancy. Which requirement of information security is addressed by implementing the plan?
Availability
Distributed processing
Breaks large volumes of data into smaller pieces which are processed by computers in different locations
You have just installed a new USB card reader in your Windows computer. Every time you perform certain action using the card reader, you get an error message you you've never seen before.
Check the manufacturer's website for information about the error.
Which of the following are common tools used to physically clean the inside of a computer?
Compressed air and a Natural bristle brush
A web server administrator is configuring access settings to require users to authenticate first before accessing certain web pages. Which requirement of information security is addressed through the configuration?
Confidentiality
For what purpose would a network administrator use the Nmap tool?
Detection and identification of open ports
Which of the following MAC features is used to launch apps, switch between running apps, access the Trash, and also to access specific folders.
Dock
A user sends a print job to network printer and it prints page after page of random characters. He calls the Help Desk and a technician discovers that the wrong printer driver has been loaded on the user's workstation. The technician loads the correct driver, verifies that the system works correctly and documents the resolution.
Educate the user as to how the problem was resolved and verify that they are satisfied with the result.
A user asks you to perform a task that you do now know how to do and is not in the scope of your job duties. What is the best way to respond?
Explain to the user that this is not a task you can perform, but you will do your best to contact someone who can perform the task.
Which Windows tools would you use to browse the file system on a drive?
File Explorer, Windows Explorer, and Computer
Which two types of institutions do malicious web pages often look like?
Financial and Bank
While answering Help Desk calls, a field customer calls and complains that he cannot print to a work group laser printer.
Have you ever printed to that printer?
What tool is used to lure an attacker so that an administrator can capture, log, and analyze the behavior of the attack?
Honeypot
What are two requirements to connect a smart device to a home wireless network?
IP Addressing and the SSID
You are responsible for managing client workstations for your company. A frantic user calls you one morning exclaiming that "nothing is working."
Identify the problem
Which of the following is a myth regarding electrostatic discharge(ESD)?
If you can't feel ESD, the surge is not sufficient to harm computer components.
ESD is most likely to occur
In a cool, dry atmosphere
You need to find a file that you saved on your computer. You will have to search for it because you don't remember which directory it was saved in. Which Windows feature improves the speed of file searches on your computer?
Indexing Service
What is the best method to avoid getting spyware on a machine?
Install software only from trusted websites.
Which two tools used for incident detection can be used to detect anomalous behavior, to detect command and control traffic, and to detect infected hosts?
Intrusion detection system and NetFlow
What are three benefits of cloud computing?
It enables access to organizational data anywhere and at any time, It eliminates or reduces the need for onsite IT equipment, maintenance, and management, and It streamlines the IT operations of an organization by subscribing only to needed services.
Which statement describes cybersecurity?
It is an ongoing effort to protect Internet-connected systems and the data associated with those systems from unauthorized use or harm.
Which of the following is a benefit of good documentation?
It saves time and money in troubleshooting problems.
Which type of network consists of wired computers in a college classroom?
LAN
A printer is behaving erratically, and you suspect a faulty port. What tool can you use to test the parallel port?
Loop-back Plug
To prevent ESD when replacing internal components, you attach an anti-static wrist strap to your wrist. Where should the other end be fastened?
Metal area on the computer case and an Anti-static mat
Which type of network is the connection between a Bluetooth headset and a vehicle?
PAN
You are connecting an older, dot matrix printer to a computer. The printer's cable is a D-shaped connector with 25 pins. Which port type does the printer connect to?
Parallel port
A medical office employee sends emails to patients about recent patient visits to the facility. What information would put the privacy of the patients at risk if it was included in the email?
Patient Records
What is the best approach to prevent a compromised IoT device from maliciously accessing data and devices on a local network?
Place all IoT devices on an isolated network
What is an example of the a Cyber Kill Chain?
Planned process of cyberattack
Which of the following are considered computer hardware?
Printer and Motherboard
Which stage of the kill chain used by attackers focuses on the identification and selection of targets?
Reconnaissance
Which of the following are considered input devices?
Scanner, Keyboard, and Microphone
You are a PC technician for a company. You receive the following email from an employee: My email doesn't work. I keep getting email sent back to me, and I can't find any of my old emails. I don't think the email program has ever worked well. Whe you arrive at the employee's desk you observe how the employee accomplished normal email tasks. You quickly determine that the problem is not with the email program but that the employee needs to be trained on how to use the program. You have several high priority task that you need to accomplish by the end of the day. What is the BEST way for you to respond?
Set up an appointment to train the employee on how to complete common email tasks.
You are looking at a female TRS connector on the computer. Which device uses this connector?
Speaker
Hard drives are best stored in a
Static Shielding Bag
Which of the following will help reduce the threat of static discharge when working on computer hardware?
Store the unused components in static shielding bags and Remain in physical contact with the server chassis at all times.