Final 1
True
'Cybersecurity certifications are a way for you to verify your skills and knowledge and can also boost your career.' Is this statement true or false?
Patient records
A medical office employee sends emails to patients about their recent visits to the facility. What information would put the privacy of the patients at risk if it was included in the email?
There was no reply from the host
A port scan returns a 'dropped' response. What does this mean?
Unethical
An employee is laid off after fifteen years with the same organization. The employee is then hired by another organization within a week. In the new organization, the employee shares documents and ideas for products that the employee proposed at the original organization. Is the employee's behavior ethical or unethical?
Availability
An organization is experiencing overwhelming visits to a main web server. You are developing a plan to add a couple of more web servers for load balancing and redundancy. Which requirement of information security is addressed by implementing the plan?
Advanced persistent threat
Carrying out a multi-phase, long-term, stealthy and advanced operation against a specific target is often referred to as what?
Ethical
During a meeting with the Marketing department, a representative from IT discusses features of an upcoming product that will be released next year. Is this employee's behavior ethical or unethical?
Weaknesses in security practices
If developers attempt to create their own security algorithms, it will likely introduce what type of vulnerabilities?
Access control problems
Improper management of physical access to a resource, such as a file, can lead to what type of security vulnerability?
Unethical
One of your colleagues has lost her identification badge. She is in a hurry to get to a meeting and does not have time to visit Human Resources to get a temporary badge. You lend her your identification badge until she can obtain a replacement.Is this behavior ethical or unethical?
Data is unaltered during transit Data is not changed by unauthorized entities
What are the objectives of ensuring data integrity? (Choose two correct answers)
Spectre Meltdown
What do you call the vulnerabilities discovered by Google security researchers that affect almost all CPUs released since 1995? (Select two correct answers)
Install software only from trusted websites
What is the best way to avoid getting spyware on a machine?
To ensure company, system and data preservation
What is the main function of the Cisco Security Incident Response Team?
To gain advantage over adversaries
What is the main purpose of cyberwarfare?
Blockchain Ledger
What names are given to a database where all cryptocurrency transactions are recorded? (Select two correct answers)
Brute force attack Rainbow tables Spraying Dictionary attack
What of the following are examples of cracking an encrypted password? (Choose four correct answers)
Race conditions
What vulnerability occurs when the output of an event depends on ordered or timed outputs?
A virus replicates itself by attaching to another file, whereas a worm can replicate itself independently.
When describing malware, what is a difference between a virus and a worm?
CompTIA Security+
Which of the following certifications meets the U.S. Department of Defense Directive 8570.01-M requirements, which is important for anyone looking to work in IT security for the federal government?
EC Council Certified Ethical Hacker
Which of the following certifications tests your understanding and knowledge in how to look for weaknesses and vulnerabilities in target systems using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner?
Reverse proxy server
Which of the following firewalls are placed in front of web services to protect, hide, offload and distribute access to web servers?
Network layer firewall
Which of the following firewalls filters traffic based on source and destination IP addresses?
Context aware application firewall
Which of the following firewalls filters traffic based on the user, device, role, application type and threat profile?
Proxy server
Which of the following firewalls filters web content requests such as URLs and domain names?
Network address translation firewall
Which of the following firewalls hides or masquerades the private addresses of network hosts?
Palo Alto Networks Certified Cybersecurity Associate
Which of the following is an entry-level certification for newcomers who are preparing to start their career in cybersecurity?
Fingerprint Voice recognition
Which of the following security implementations use biometrics? (Choose two correct answers)
Open authorization
Which technology creates a security token that allows a user to log in to a desired web application using credentials from a social media website?
Confidentiality
You are configuring access settings to require employees in your organization to authenticate first before accessing certain web pages. Which requirement of information security is addressed through this configuration?
If the laptop requires user authentication for file and media sharing
You are surfing the Internet using a laptop at a public Wi-Fi cafe. What should you check first before you connect to the public network?