click below
click below
Normal Size Small Size show me how
cybersec f2
| Question | Answer |
|---|---|
| What principle protects information from unauthorized access? Group of answer choices confidentiality accounting nonrepudiation integrity | confidentiality 1/1 |
| What two approaches protect data secrecy? Group of answer choices authentication integrity nonrepudiation availability encryption authorization | encryption authentication |
| How are data accuracy and consistency ensured? (Choose two) Group of answer choices privacy data consistency checks authorization repudiation hashing availability | data consistency checks hashing |
| What three methods ensure system availability? Group of answer choices system resiliency integrity checking fire extinguishers up-to-date operating systems equipment maintenance system backups | system backups up-to-date operating systems equipment 1 |
| What term describes a secure, virtual network over public infrastructure? Group of answer choices NAC IDS Firewall MPLS IPS VPN | vpn 1/1 |
| What two approaches ensure system uptime? Group of answer choices integrity checking system backups system resiliency up-to-date operating systems equipment maintenance fire extinguishers | equipment maintenance system backups ???? |
| What three services does access control provide? Group of answer choices availability repudiation access authentication authorization accounting | authentication authorization accounting 1/1 |
| What three objectives does a thorough security policy achieve establishes guidelines for acceptable conduct provides management's endorsement and support for security measures useful for management vagueness outlines penalties for non-compliance | establishes guidelines for acceptable conduct provides management's endorsement and support for security measures outlines penalties for non-compliance 1/1 |
| What are two widely used hash functions? Group of answer choices MD5 RSA Blowfish SHA ECC RC4 | MD5 SHA 1/1 |
| How can organizations safeguard against unintended modifications by authorized personnel? Group of answer choices version control hashing backups SHA-1 encryption | version control 1/1 |
| What type of software profits from displaying intrusive pop-ups? Group of answer choices trackers pop-ups spyware adware | adware 1/1 |
| What are two common indicators of spam mail? The email has keywords in it The email has misspelled words or punctuation errors or both The email is from a friend The email is from your supervisor The email has no subject line. | The email has misspelled words or punctuation errors or both The email has no subject line. 1/1 |
| What does the term "logic bomb" refer to? Group of answer choices a malicious program that hides itself in a legitimate program a malicious worm a program that activates harmful code when triggered a malicious virus | a program that activates harmful code when triggered 1/1 |
| What does a rootkit alter? Group of answer choices operating system screen savers Microsoft Word Notepad programs | operating system 1/1 |
| What is the term for a targeted email scam against a financial institution's employee? Group of answer choices vishing target phishing spam spyware spear phishing | spear phishing 1/1 |
| What is the term for fraudulent emails posing as legitimate sources? Group of answer choices vishing phishing Trojan social engineering backdoor | phishing 1/1 |
| What are two weaknesses of the WEP protocol? Everyone on the network uses a different key WEP uses the same encryption features as Bluetooth The key is static and repeats on a congested network The key is transmitted in clear text | The key is static and repeats on a congested network The key is transmitted in clear text 1/1 |
| How do viruses and worms differ? Group of answer choices worms reproduce on their own, whereas viruses require a host. Worms require a host file but viruses do not Viruses hide in legitimate programs but worms do not | worms reproduce on their own, whereas viruses require a host. 1/1 |
| What is the term for code that evades normal authentication? Group of answer choices backdoor virus ransomware worm Trojan | backdoor 1/1 |
| What is the term for an attack exploiting SQL databases through user input fields? Group of answer choices XML injection Cross-site scripting SQL injection buffer overflow | SQL injection 1/1 |
| 17.333 | |
| What term describes a storage device linked to a network? Group of answer choices SAN DAS Cloud RAID NAS | NAS 1/1 |
| What type of laws safeguard your sensitive information from being shared by organizations? Group of answer choices nonrepudiation confidentiality privacy authentication integrity | privacy 1/1 |
| What three objectives does a thorough security policy achieve? useful for management outlines penalties for non-compliance establishes guidelines for acceptable conduct provides management's endorsement and support for security measures | outlines penalties for non-compliance establishes guidelines for acceptable conduct provides management's endorsement and support for security measures 1/1 |
| What three design principles support high availability? protect data privacy validate data integrity implement redundant or backup systems identify failures in real-time ensure no critical component has only one point of failure | implement redundant or backup systems identify failures in real-time ensure no critical component has only one point of failure 1/1 |
| What are three types of sensitive information? Group of answer choices declassified public business published PII classified | business PII classified 0.5 declassified PII classified ?? classified Pll |
| What are the cybersecurity triad's three core elements? Group of answer choices confidentiality integrity availability security encryption policy | confidentiality integrity availability 1/1 |
| What is the term for deceptive SMS messages that trick users into visiting malicious websites? Group of answer choices grayware impersonation smishing spam | smishing 1/1 |
| What happens when data exceeds a buffer's capacity? Group of answer choices a buffer overflow cross-site scripting an SQL injection a system exception | a buffer overflow 1/1 |
| What vulnerability enables script injection into users' web page views? Group of answer choices buffer overflow XML injection Cross-site scripting SQL injection | Cross-site scripting 1/1 |
| What does a rootkit alter? Group of answer choices programs screen savers operating system Microsoft Word Notepad | operating system 1/1 |
| 18.5 | |
| What service controls user permissions and access levels? Group of answer choices authorization authentication accounting biometric token | authorization 1/1 |
| What term describes alterations to original data, including manual modifications, processing changes, and system failures? Group of answer choices dissemination corruption deletion modification integrity backup | modification 1/1 |
| What are two ways to protect a computer from malware? Group of answer choices Empty the browser cache Defragment the hard disk Delete unused software Keep software up to date Use antivirus software | Keep software up to date Use antivirus software 1/1 |
| What two tactics do social engineers use to deceive targets into revealing sensitive information? Group of answer choices intimidation urgency compassion integrity | urgency intimidation 1/1 |
| What type of attack involves intercepting data from nearby devices, as in the case of an attacker copying emails and contact lists outside a store? Group of answer choices bluejacking RF jamming bluesnarfing smishing | bluesnarfing 1/1 |
| 19/20 | |
| What is a method of sending information from one device to another using removable media? | sneaker net 1/1 |
| What does the first dimension of the cybersecurity cube represent? | goals 1/1 |
| What is the term for software used to gather information about a user's computer without their consent? | spyware 1/1 |
| 18 |