Cyber Security Fundamentals 2020 Pre-Test

Ace your homework & exams now with Quizwiz!

What are rootkits

A piece of software that can be installed and hidden on your computer without your knowledge

What does an Incident Response Plans allows for

A timely and controlled response to security incidents, and attempts to mitigate any damage or lose

A ________ and _________ are network infrastructure devices

All

How can I protect myself against fake antiviruses

All

What is a Virtual Private Network used for

Allows employees to connect securely to their network when away from the office

What is the current DoD repository for sharing security authorization packages and risk assessment data with Authorizing officials?

Army Portfolio Management System (APMS)

What is Website security

Both A&B

_____________your wireless data prevents anyone who might be able to access your network from viewing it

Encrypting

How often do all cybersecurity workforce personnel take the Cybersecurity Fundamental training IAW DA PAM 25-2-6

Every year

An indication is a sign that an incident may never occur

FALSE

Shoulder Surfing is a good thing because people can get valuable information. You should never try to protect against this behavior

FALSE

According to DoD 8570.01-M, the IA technical category consists of how many levels?

I, II, & III

Which of the following categories require a privileged access agreement?

IA Management

In accordance with AR 25-2, whose responsibility is it to ensure all users receive initial and annual IA awareness training?

IASO

What are the four objectives of planning for security

Identify , design, test and monitor

What is a Distributed Denial-of-Service attack?

It occurs when multiple machines are operating together to attack one target

What does LAMP stands for

Linux, Apache, My SQL and PHP

Which of the following certifications would satisfy IAM level II and IAM level III?

Security+

SSID stands for

Service Set Identifier

What are the three main cloud computing service models

Software as a Service, platform as a Service and Infrastructure as a Service

Interoperability is a weakness in Cloud Computing

TRUE

A precursor is a sign that an incident may occur in the future

True

Individual networks may be affected by DoS attacks without being directly targeted

True

Viruses, Worms and Trojan horses are types of malicious code

True

Encryptions is a way to send a message in ____________

code

The two common denial-of-service attacks are

rootkits and botnets

A denial-of-service (DoS) attack occurs when legitimate _________ are unable to access ________, ______ or other network resources due to the actions of malicious cyber threat factors

users, Information systems, devices


Related study sets

Engineering Materials Chapter 10: Fundamentals of metal casting

View Set