Question
Backup
Hashes or checksums
Encryption
Authentication
click below
click below
Question
Normal Size Small Size show me how
Summative 1
Introduction to Cybersecurity M1-M4
Question | Answer |
---|---|
Which of the following methods is used to check the integrity of data? Backup Hashes or checksums Encryption Authentication | Hashes or checksums |
Which of the following statements describes cyberwarfare? | Cyberwarfare is an Internet-based conflict that involves the penetration of information systems of other nations |
Which of the following methods can be used to ensure confidentiality of information? (Choose three correct answers) | Data encryption Two-factor authentication Username ID and password |
Which of the following pieces of information would be classified as personal data? (Select three correct answers) | Social security number Driver license number Date and place of birth |
Why might internal security threats cause greater damage to an organization than external security threats? | Internal users have direct access to the infrastructure devices |
Which of the following is a key motivation of a white hat attacker? | Discovering weaknesses of networks and systems to improve the security level of these systems |
An individual user profile on a social network site is an example of an ______ identity. Online Offline | Online |
Cybersecurity is the ongoing effort to protect individuals, organizations and governments from digital attacks by protecting networked systems from harm. What level of cyber protection does each of the following factors require? | Your online identity – Personal A customer database – Organizational Economic stabilty – Government |
Your neighbor tells you that they don’t have an online identity. They have no social media accounts and only use the Internet to browse. Is your neighbor right? | No |
What are the foundational principles for protecting information systems as outlined in the McCumber Cube? (Choose three correct answers) | Integrity Availability Confidentiality |
Stuxnet malware was designed for which primary purpose? | To cause physical damage to equipment controlled by computers |
Which of the following examples illustrates how malware might be concealed? | An email is sent to the employees of an organization with an attachment that looks like an antivirus update, but the attachment actually consists of spyware |
What is the purpose of a rootkit? | To gain privileged access to a device while concealing itself |
What type of attack allows an attacker to use a brute-force approach? Denial of service Packet sniffing Social engineering Password cracking | Password Cracking |
What is the most common goal of search engine optimization (SEO) poisoning? | To increase web traffic to malicious sites |
What do you call a program written to take advantage of a known security vulnerability? An exploit Antivirus A firewall A software update | An exploit |
Which of the following security vulnerabilities could result in the receipt of malicious information that could force a program to behave in an unintended way? | Non-validated input |
A set of changes done to any program or application with the aim of updating, fixing or improving it is often referred to as what? A hack A patch An install A fix | A patch |
What is a miner? | A person that solves complex mathematical puzzles to verify a transaction |
What is the primary goal of a DoS attack? | To prevent the target server from being able to handle additional requests |
Which of the following should be carried out to address known software vulnerabilities of a specific application? | Install a security patch |
Which of the following characteristics describe a worm? (Select two correct answers) | Travels to new computers without any intervention or knowledge of the user Is self-replicating |
Who is responsible for overseeing a blockchain electronic ledger? A central bank Anyone belonging to the blockchain network A government regulatory body A central blockchain authority | Anyone belonging to the blockchain network |
Securing physical access to target equipment is an organization’s best defense against a cyber attack.’ Is this true or false? | True |
Where is cryptocurrency stored? In a wallet On an exchange In a bank account On the blockchain | In a wallet |
You have stored your data on a local hard disk. Which method would secure this data from unauthorized access? | Data encryption |
How can you keep your personal browsing history hidden from other users on a shared computer? | Operate the web browser in private browser mode |
Which type of technology can prevent malicious software from monitoring user activities, collecting personal information and producing unwanted pop-up ads on a user computer? | Antispyware |
Why do IoT devices pose a greater security risk than other computing devices on a network? | Most IoT devices do not receive frequent software updates |
What should you do in order to make sure that people you live with do not have access to your secure data? | Set up password protection |
Which of the following is an example of two factor authentication? | Your fingerprint and your password |
You're looking to print photos you saved on a cloud storage using third-party online printing service. After logging into it, you're automatically given access to the third-party printing service. What allowed this automatic authentication to occur? | The cloud storage service is an approved application for the online printing service |
You are having difficulty remembering passwords for all of your online accounts. What should you do? | Save the passwords in a centralized password manager program |
Which of the following is a requirement of a strong password? | Use special characters such as ! @ or $ |
Which of the following passwords would most likely take the longest for an attacker to guess or break? | mk$$cittykat104# |
What is the best method to prevent Bluetooth from being exploited? | Always disable Bluetooth when it is not being used |
How can you prevent others from eavesdropping on network traffic when operating a PC on a public Wi-Fi hotspot? | Connect with a VPN service |
Which configuration on a wireless router is not considered to be adequate security for a wireless network? | Preventing the broadcast of an SSID |
Which technology removes direct equipment and maintenance costs from the user for data backups? | cloud service |
What is the only way of ensuring that deleted files on your computer are irrecoverable? | Physically destroying your computer’s hard drive |
What is the correct definition of risk management? | The process of identifying and assessing risk to reduce the impact of threats and vulnerabilities |
Which of the following tools can be used to provide a list of open ports on network devices? Ping Tracert Nmap Whois | NMap |
Which of the following tools can perform real-time traffic and port analysis, and can also detect port scans, fingerprinting and buffer overflow attacks? | Snort |
‘Today, there are single security appliances that will solve all the network security needs of an organization.’ Is this statement true or false? | False |
What name is given to a device that controls or filters traffic going in or out of the network? | Firewall |
What tool can identify malicious traffic by comparing packet contents to known attack signatures? | IDS |
What protocol is used to collect information about traffic traversing a network? HTTPS NetFlow Telnet NAT | Netflow |
Behavior-based analysis involves using baseline information to detect what? Risk Anomalies Backdoors Vulnerabilities | Anomalies |
What is the last stage of a pen test? Scanning Analysis and reporting Gathering target information Maintaining access | Analysis and Reporting |
What is a security playbook? | A collection of repeatable queries or reports that outline a standardized process for incident detection and response |
What is the main aim of a Cyber Security Incident Response Team (CSIRT)? | To help ensure organization, system and data preservation by performing investigations into computer security incidents |
How do Cisco ISE and TrustSec work? | They enforce access to network resources by creating role-based access control policies |
The risk management process consists of four steps. Can you put these in the right order? | 1. Frame the risk 2. Assess the risk 3. Respond to the risk 4. Monitor the risk |