Cybersecurity midterm

Ace your homework & exams now with Quizwiz!

Which set of letters spells a valid word when decrypted using the Caesar cipher with a key of 2? HJG TWP XPY PLC

twp

You are purchasing a birthday gift for your sister. You both share a computer. How can you hide your searches? Clear cache. Turn on proxy settings. Use private browsing. Refuse security certificates.

use private browsing

Which of the following will not increase your browsing speed? storing and using cache enabling client-side scripting using proxy settings using private browsing mode

using private browsing mode.

What is not true of white hat hackers? They contribute to robust security systems They use the same methods as black hat hackers They alert companies of security vulnerabilities They are breaking the law and are at risk of legal repercussions

They are breaking the law and are at risk of legal repercussions (white hat hackers are legal hackers working for an individual company or penetration testing legally).

In a three-tier application architecture example, which device runs the presentation layer? Application server Client computer Cloud server File server

client computer.

Encrypted information is only viewable by authorized users who have the correct key to decrypt. This describes which aspect of the CIA triad? Integrity Confidentiality Availability Collisions

confidentiality

Sarah puts a lock on her diary so only she can read it. Her little brother breaks the lock and reads her diary. Which part of the CIA triad was broken? Confidentiality Integrity Availability All of the above

confidentiality

Alice is checking her grades on a school computer in the library, and she forgets to log out before she leaves. Bob gets on the computer after her, and he sees her grades for all of her classes. Which part of the CIA triad was broken? Confidentiality Integrity Availability All of the above

confidentiality (confidentiality is a set of rules that limits access to information, integrity is the assurance that the information is trustworthy and accurate, and availability is a guarantee of reliable access to the information by authorized people.)

Encryption plays a crucial role in maintaining which part(s) of the CIA triad? Confidentiality Integrity Availability Confidentiality and Integrity Integrity and Availability Confidentiality and Availability

confidentiality and integrity.

Which is a privilege typically reserved for admin accounts only? Install programs. Create user accounts. Create a private folder. Change the theme and desktop background.

create user accounts.

You have downloaded a program that can be run on Windows or on macOS. What term is used to describe this type of software? Cross-platform Open source Proprietary Site licensed Single-platform

cross-platform

Which security method is used to protect your files and the state of your computer? Software Update Data Backup Operating System Patch Antivirus Software

data backup

True or False: Cyberbullying can be persistent, permanent and discreet (meaning teachers and parents can't see or overhear cyberbullying). False True

true

Felipe is trying to find information on wind power in Germany. Which of the following would be the most effective search query for this? wind +power "wind" +Germany "wind power" -Spain "wind power" +Germany

"wind power" + Germany.

Which extension will only open on a Windows computer? .doc .dmg .exe .pdf

.exe

In cybersecurity, what does CIA stand for? Confidentiality, Integrity, Availability Central Intelligence Agency Cybersecurity Investigation Agency Cybersecurity, Internet, Accessibility

Confidentiality, integrity, availability.

Which of the following can help you to maintain your digital footprint? I. Using privacy settings to limit your exposure II. Posting long rants when you are angry about something III. Reviewing posts you are tagged in and taking action if needed IV. Googling yourself on a regular basis I and IV I, II and III I, III, and IV All of the above.

I, 3 and 4

Which of the following is true about jobs in the field of cybersecurity? There are a lot of unfilled positions in cybersecurity right now, but in the next few years all of those positions will be filled. Right now there aren't many unfilled cybersecurity positions, but there will be more in the next couple of years. There are many unfilled cybersecurity positions right now, and there will be even more unfilled positions in the next couple of years. There are too many qualified cybersecurity professionals. There are no unfilled positions now, and there won't be any unfilled positions in the next few years.

There are many unfilled cybersecurity positions right now, and there will be even more unfilled positions in the next couple of years.

Which of the following devices is not a part of the Internet of Things? A watch that allows you to measure and track your activity through a mobile app A security system that lets you remotely monitor your home A physical combination padlock for your gym locker A car with a built-in navigation system

a physical combination padlock for your gym locker.

Which of the following security features is put into place to ensure correct authorization? Password policies Automatic updates Account permissions Multi-factor authentication

account permissions.

Why do we use cryptography? To secure digital and non-digital data To allow important messages to be sent with lower chances of being interpreted To add security to the use of specific machinery All of the above

all of the above.

Which of the following lists the types of copyright license from most restrictive to least restrictive? Public Domain, All Rights Reserved, Some Rights Reserved Public Domain, Some Rights Reserved, All Rights Reserved All Rights Reserved, Some Rights Reserved, Public Domain All Rights Reserved, Public Domain, Some Rights Reserved

all rights reserved, some rights reserved, public domain.

What is a security baseline? The main, controlling account responsible for providing security updates and user permissions. The process of securing a system's settings and configurations to reduce vulnerabilities. An agreed upon set of rules and permissions. A check to see if there are any vulnerabilities or processes that need to be changed.

an agreed upon set of rules and permissions.

Which is the most popular mobile OS out of the choices below? Chrome OS Blackberry Windows Phone Android

android

Which of the following is most commonly considered a mobile OS? Apple Macintosh Android Microsoft Windows Linux

android

Which security method is used to protect your computer from threats and warns you of possible vulnerabilities? Software Update Data Backup Operating System Patch Antivirus Software

antivirus software

An alert pops up on your screen informing you of a possible vulnerability in your system. Which security method is most likely responsible for sending this alert? Antivirus Software Data Backup Operating System Patch Software Update

antivirus software.

Robert is on an online auction site trying to make a bid on a new computer. As he tries to make a bid, the site crashes and he loses the auction. Which part of the CIA triad was broken? Confidentiality Integrity Availability All of the above

availability (Availability means information should be consistently and readily accessible for authorized parties.)

Which of the following statements are true? A. There has been a decrease in the number of cyber attacks in the past decade. B. Cybersecurity is the protection of computer systems, networks, and data from digital attacks. C. Cyber attacks in the past few years have impacted individuals, governments, and organizations. A only B only B and C A, B and C

b and c

A saved collection of data and files used to improve your browsing speed is called: client-side script proxy cache certificate

cache

You are using the terminal to move through your computer's folders. You'd like to get into the Cybersecurity folder. You type in pwd and find that your current folder path is ~/Users/student/Documents/Cybersecurity/Images. Which of the following commands will place you inside the Cybersecurity folder? cd .. mv .. cd Cybersecurity mv Cybersecurity

cd...

What is the term used in cryptography for the message after encryption? algorithm ciphertext key plaintext

ciphertext

You notice that your browser is running a bit slow. Which of the following settings could be changed in order to increase your browsing speed? Cache is enabled. Pop ups are disabled. Proxy settings are used. Client-side scripting is disabled.

client side scripting is disabled.

Which is a disadvantage of Mac operating systems? Poor security features. Not much memory. Too many different active versions. Computers that run Mac OS can be expensive.

computers that run Mac OS can be expensive (linux is free and windows computers are typically cheaper)

Which type of software license allows a predetermined number of people to use the account at the same time? Single use license Group license Site license Concurrent license

concurrent license (if a company purchases 5 concurrent licenses, that means that up to 5 of their employees can use the software at any given time.)

Encrypted information is only viewable by authorized users who have the correct key to decrypt. This describes which aspect of the CIA triad? Confidentiality Integrity Availability Security

confidentiality

Which of the following shows the word "CAT" encrypted with the Caesar cipher with a key of 1? DBU CAT BZS Can not be encrypted.

dbu

Which of the following is a task for the processor? Schedules backups and updates. Translates between the operating system and the hardware. Manages the antivirus software. Determines how memory is used.

detmerines how memory is used.

True or False: A message in unencrypted form is called ciphertext. True False

false

True or False: An incremental backup backs up all data on your computer. True False

false

True or False: Learning computer science or coding is only useful if you want to become a professional programmer. True False

false

True or False: Permissions can be set on a folder, but not individual files. True False

false

True or false: The internet is a great place to socialize, and because it is completely online, everyone is safe. True False

false

What does GUI stand for? Gallery Used Ideas Gradual User Images Graphical User Interface Graphic Unity Icons

graphical user interface

What is a server OS used for? Handling requests and supplying responses. Running multiple operating systems on a computer system. Performing one task, such as in an STM machine. Running a permanent system, like the timing controls in a washing machine.

handling requisitions and supplying responses.

Which of the following is not interchangeable with the word "application"? App Hardware Program Software

hardware

Which feature of a file system is responsible for keeping track of changes in the system? Compression Encryption Permissions Journaling

journaling

Which OS is currently the most popular for desktops and laptops? Microsoft Windows Apple Macintosh Linux Penguin

microsoft windows

Which of the following file types would enable an audio file to work on both Windows and macOS? AIFF DOCX MP3 WMA

mp3

You'd like to add features to a calendar app with the permission of the vendor without paying any licensing fees. What type of license is required to be able to do this? Free Open source Site license Subscription

open source

In 2016, online fraud cases in the United States resulted in victim losses totaling: Nothing-online fraud doesn't result in victim losses $100,000 $2 million Over $1.2 billion

over 1.2 billion

Using the Caesar cipher, "HELLO" is encrypted to "OLSSV" by applying a shift of 7. The message "HELLO" is considered the __________. algorithm ciphertext key plaintext

plaintext

Max pays a quarterly fee for a cloud storage account. Which describes this type of software? Open-source, subscription Open-source, one-time purchase Proprietary, subscription Proprietary, one-time purchase

proprietary, subscription.

Which of the following can be used to filter which sites are allowed through to the browser? client-side scripting private browsing mode cache proxy settings

proxy settings

You've been asked to filter and block certain sites for your younger sister. Which of the following can be used to filter which sites are allowed through to the browser? cache client-side scripting private browsing mode proxy settings

proxy settings.

Which MacOS terminal shell command will display all of the processes that are currently running on your computer? ps sudo cp mv

ps

Which security method is used by companies to fix a flaw in their application? Software Update Full Backup Incremental Backup Antivirus Software

software update

Which statement is true about cross-platform software? It must be open source. Some features might vary. It will work the same on every platform. Some versions will work only in a cloud-based environment.

some features might vary.

Which keyword can be used in a Mac operating system terminal shell to access administrator rights? ps sudo cp mv

sudo

True or False: Authorization is what the user is allowed to see or do. True False

true

Marsha found her sister's diary that listed all of her passwords. However, it wasn't listed for which site the passwords were used. She tried each password listed until she was able to log into her sister's computer. What method of code-breaking did Marsha use? Frequency analysis Brute force Frequency distribution Using a dictionary

using a dictionary

Your system is a 32-bit Windows system. You have installed a 64-bit version of a driver file. What will happen? Windows will update the driver. Windows cannot use the driver. Windows will be able to run the driver as is. Windows will run the driver in a compatibility mode.

windows cannot use the driver.

From the following choices, which would be the most important update to download? Microsoft Word Update Chrome Browser Update Windows OS Update Skype Application Update

windows os update

What is the primary flaw with the Caesar Cipher and other substitution ciphers? It could not be applied to all messages With enough frequency, a message could be decrypted It could only be used in English There were too many options when encrypting a message

with enough frequency, a message could be decrypted.

Which of the following is true about the Internet of Things? I. The Internet of Things is the network of devices with the ability to connect and exchange data. II. The Internet of Things increases our vulnerability to cyber attacks. III. The Internet of Things is purely positive-there are no negative consequences to increased connectivity I only I and II I and III None of the above

1 and 3

Which of the following statements are true about cyberbullying: I. Cyberbullying uses electronic communication to bully a person. II. Cyberbullying is a crime in many states. III. Instances of cyberbullying do not affect the digital footprint of the victim. IV. Cyberbullying hurts real people even though we can't always see their reactions online. I and IV II and III I, II, and IV All of the above

1, 2 and 4

Which of the following devices is not connected to the Internet of Things? An AM/FM radio without any bluetooth or Internet connection capabilities A wearable device that measures your physical activity and allows you to track your activity through a mobile app A smart thermostat that allows you to remotely control your home's temperature through a mobile app A digital baby monitor that allows you to stream video and audio of your nursery from the Internet

An AM/FM radio without any bluetooth or internet connection capabilities.

Which of the following is not true about cybersecurity? Recent data breaches have released personal information of hundreds of millions of people. Cybersecurity is the protection of computer systems, networks, and data from digital attacks. As we rely more on computing devices to store and send data, we increase our vulnerability to cyber attacks. Cyber attacks can devastate large organizations, but individuals are largely unaffected.

Cyber attacks can devastate large organizations, but individuals are largely unaffected. (individuals are also largely affected by data breaches from large organizations. It is their data being leaked.)

Which of the following are safety guidelines when socializing online? I. Be wary when communicating with people you don't know in real life II. Don't disclose personal information-even if it doesn't seem important III. Don't have any social media accounts IV. Block/report if you are being harassed V. Don't send or receive any emails VI. Ask a trusted adult if you need help I, II and III I, II, IV, and V I - IV all I, II, IV, and VI

I, 2, 4, 6

A person's digital footprint consists of the following: I. Comments you leave II. Pictures you post III. Topics you search IV. Apps you use V. Music you download VI. Emails you send I only II only I - IV only I - VI all

I- vi (all)

There are a number of different cryptography methods that range in complexity, but it is always important to add a layer of encryption to your private data. Which of the following are ways to encrypt your own private data? A. Using strong passwords B. Setting up and using 2-factor authentication C. Only clicking on links that are sent through email D. Safe web browsing E. Using the same password for every site or app A, B, C, D and E A, B, and D A, B, D, and E A, B, C, and D

a b and d

Which kind of personal information do people send over the Internet? Credit Card Numbers Contact Information Medical Information All of the above

all of the above

Which of the following is true of the WannaCry ransomware attack? Hackers locked down computers and demanded payment to unlock Medical services were disrupted as a result of the attack The attack may have been possible because people had not updated their operating systems All of the above are true

all of the above are true.

A privacy policy discloses: How a company uses your data How a company shares your data How a company gathers your data All of the above

all of the above.

Victims of cyberbullying may experience which of the following? Isolation Low self-esteem Depression All of the above

all of the above.

Which of the following actions will help you avoid violation of copyright laws? Always cite sources Check the copyright to make sure it can be used by others without permission Use public domain media All of these answers

all of the above.

Which of the following are best practices for having a secure password? Creating a password that is long in length Creating a password that has a combination of letters, numbers, and special characters Using a password manager All of the above

all of the above.

Which of the following are saved even when in private browsing? Cookies Bookmarks Temporary Files Search Records

bookmarks

Roland knew that the code to his sister's toy safe was only two digits long. He was able to crack the safe open by attempting every two-digit code until he found the correct one. What method of code-breaking did Roland use? Frequency analysis Brute force Frequency distribution Using a dictionary

brute force

Which of the following methods are effective in cracking the Caesar cipher? Brute force only Letter frequency analysis only Brute force and letter frequency analysis Neither - the Caesar cipher is too difficult to crack.

brute force and letter frequency analysis

Your web browser is showing an outdated picture on a website that you visit often. Which of the following would be the best choice for attempting to fix this issue? Clear cache. Install an add-on. Remove an extension. Disable client-side scripting.

clear cache.

What does a ransomware hacker do when they gain access to a user's system? Encrypt important files Delete key system data Copy a users personal data Move operating system data

encrypt important files.

What should be the primary focus of keeping information secure? Educating users on the dangers of phishing attempts Encrypting all personal data Ensuring the confidentiality, integrity, and availability of data Implementing a strong password policy

ensuring the confidentiality, integrity, and availability of data.

Which of the following is a disadvantage of a single-platform application? The performance of the application is not optimized for the platform. There are more bugs and issues with the application. There may be compatibility issues when a file is shared on the same platform. Exposure of the application is limited.

exposure of the application is limited.

True or False. The information about a particular person that exists on the Internet is a result of only a portion of their online activity. Some things don't matter or are not part of a person's digital footprint.

false

True or False: Cracking a Vigenère cipher with brute force takes longer than a Caesar cipher, but it is still a reliable method for cracking the encryption. True False

false

True or False: It is legal to practice hacking public websites as long as you are a student learning about cybersecurity. True False

false

True or False? You can strengthen the encryption of a Caesar cipher by shifting the letters twice (using two keys). True False

false

True or false: You are not able to access a website that does not have a valid security certificate. True False

false

By checking the box on a privacy policy page, a company can legally use your data and information in all the ways disclosed, no matter what. True. This is always the case. True. Changing your settings does not affect the privacy policy. False. It depends if the privacy policy allows you to opt in or out of sharing data. False. Companies do not give you the option to update your settings.

false, it depends if the privacy policy allows you to opt in or out of sharing data.

Which file system would be the best choice to use in a drive that will be used with both Windows 10 and macOS? Ext4 FAT32 HFS NTFS

fat32

What is the main fear that ransomware attacks center around? Fear of hackers Fear of the Internet Fear of being spied on Fear of losing important files

fear of losing important files.

Which type of operating system is permanently programmed into a hardware device? Embedded OS Firmware Mobile OS Hypervisor

firmware

What is the resulting ciphertext when the word DAN is encrypted using the Caeser cipher along with the key of 3? BYL AXK GDQ XWJ

gdq

Cynthia discovers that she has the ability to modify the lunch menu posted on her school's website. She edits the website so for lunch every day, it says "Green Eggs and Ham". Which part of the CIA triad was broken? Confidentiality Integrity Availability All of the above

integrity

Alice is buying books from an online retail site, and she finds that she is able to change the price of a book from $19.99 to $1.99. Which part of the CIA triad has been broken? Confidentiality Integrity Availability

integrity (Integrity means that data can be trusted. It should be maintained in a correct state, kept so that it may not be tampered with, and should be correct, authentic, and reliable)

Linux is an open source operating system. What does "open source" mean? It means that it is free. It means that anyone can view, copy and then change the source code. It means that there are over 600 versions available. It means that it comes with unlimited support.

it means that anyone can view, copy and change the source code.

Which of the following shows the word "DOG" encrypted with the Caesar cipher with a key of 5? IPH CAT FQI ITL

itl

A deceptive email is typically used in a phishing attack. Which of the following is most likely a legitimate email address? [email protected] [email protected] [email protected] [email protected]

[email protected]

Your computer crashed! Your data was not corrupted due to which feature of your NTFS system drive? compression encryption journaling permissions

journaling

To decrypt an encrypted message, pass the encrypted message and the _____to the decrypt function. cryptology decrypted message key ciphertext

key

Using the Caesar cipher, "HELLO" is encrypted to "OLSSV" by applying a shift of 7. The number 7 is considered the __________. algorithm ciphertext key plaintext

key

Spear-phishing is when hackers search for and use personal data to directly target a person in a phishing email. Of the following, which would provide the most credibility in a spear-phishing email? Knowing your full name Knowing your hobbies Knowing a recent store that you shopped at Knowing your address

knowing your hobbies.

True or False: Computers have made it easier and faster to crack the Caesar cipher. True False

true

During an internship, a client requests that her database application be moved to a separate network drive. What kind of architecture is this an example of? N-tier Wireless Cloud-hosted Local Network Hosted

local network hosted.

Which application delivery method is considered to be in a two-tier pattern in which the presentation is stored on your computer and the code and data are stored on a server? Local Installation Local Network Hosted Cloud Hosted n-tier

local network hosted.

What is the core technology that allows digital devices to connect and transmit data with each other? sensors networks smart phones a global positioning sensor or GPS

networks.

What is the ciphertext that results from encrypting the word LET using the Vigenere cipher along with the keyword, CAB? MFU JES NGV NEU

neu

A locally installed application is an example of which application architecture? N-tier One tier Two tier Three tier

one tier

If you would like to ensure that your site history is not recorded, you can: clear your cache. open a window in private browsing mode. enable client-side scripting. change your proxy settings.

open a window in private browsing mode.

Which of the following security features is put into place to ensure correct authentication? Filter/Block sites Automatic updates Account permissions Password policies

password policies.

Which of the following describes an instance of legal hacking? Looking for security risks on a product that is excluded from a bug bounty program. Penetration testing for a company Grey hat hacking Security hacking is never legal

penetration testing for a company.

Your computer is running slowly and you believe it is because of a program that is running in the background. Which terminal command will allow you to see all of the running programs and applications on your computer? dir kill ls ps

ps

Which MacOS terminal shell command will display the path of the folder that you are currently working in? ls cd pwd dir

pwd

Your friend is on a Windows computer and is unable to open and view the file that you created in the Pages application on your Mac. Which is the best option to ensure that he can correctly view your file? (Note: Your friend does not need to edit the file.) Copy the text from the file and email to your friend. Take a picture of the file and send the picture to your friend. Save the Pages file as a pdf and send the pdf file to your friend. Retype the document into an application that is compatible with both Windows and Macs.

save the pages file as a pdf and send the pdf file to your friend.

Which of the following is a task that the operating system is NOT responsible for? Manages hardware such as a mouse. Keeps track of files and folders. Supplies power to peripherals such as a printer. Secures the computer with user accounts and passwords.

supplies power to peripherals such as a printer.

What is the term used in cryptography when the same key is used to encrypt and decrypt the data? Asymmetric Encryption Substitution Cipher Reflexive Encryption Symmetric Encryption

symmetric encryption

Which of the following describes a credible source? The author is not listed. There are no sources cited. The page is poorly designed and confusing to navigate. The domain is .edu.

the domain is .edu.

What is comprised of millions of smart devices and sensors connected to the internet? the cloud the data center the internet of things the CIA triad

the internet of things.

Which of the following most accurately describes the Internet of Things? Malicious hackers intent on stealing confidential information like credit card numbers or email addresses All of the websites that a person can currently access online Internet service providers who make it possible to go online The network of devices with the ability to connect and exchange data

the network of devices with the ability to connect and exchange data.

Cryptography is defined as: The practice of encoding information so only authorized people can read it Sensitive information sent over networks that needs to be secured Verified authority to view information, such as a password or key The act of stealing personal information online

the practice of encoding e=information so only authorized people can read it.

Which statement is true about the Vigenère cipher? The Vigenère cipher uses complex mathematical algorithms to encrypt messages. You can use letter frequency analysis to crack a message encrypted with a Vigenère cipher. The Vigenère cipher is easier to crack than the Caesar cipher. The Vigenère cipher utilizes more than one shift value dependent on a keyword.

the vigenere cipher utilizes more than one shift value dependent on a keyword.

An encryption method that uses a series of interwoven Caesar ciphers based on the letters of a keyword is called hashing the Vigenère Cipher the symmetric key public key encryption

the vignenere cipher.

True or False: A 32-bit operating system can usually be run on a 64-bit processor but the reverse is not true. True False

true


Related study sets

Business Law, Unit 3, Chapter 12: The Agreement, Offers and Acceptances

View Set

EMT Chapter 21 Gynecologic Emergencies

View Set

Chronic Kidney Disease HESI Case Study

View Set

Fundamentals Nursing Prep U Chapter 3 Heath, Illness, and Disparities

View Set

Unit 3 Molecular Geometry, Bonding, and Polarity

View Set

MED SURG EXAM 2 JEOPARDY GAME - JUNE 6, 2022

View Set

IASD AP Physics II, ELECTRIC POTENTIAL

View Set

KIN 245: The Wrist and Hand Joints

View Set

Comm 151 Final Exam: Suggested Questions

View Set

OCI Architect 2021 Associate [1Z0-1072-21] - Practice Exam

View Set