Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Introduction to Cybersecurity M1-M4

        Help!  

Question
Answer
Which of the following methods is used to check the integrity of data? Backup Hashes or checksums Encryption Authentication   Hashes or checksums  
🗑
Which of the following statements describes cyberwarfare?   Cyberwarfare is an Internet-based conflict that involves the penetration of information systems of other nations  
🗑
Which of the following methods can be used to ensure confidentiality of information? (Choose three correct answers)   Data encryption Two-factor authentication Username ID and password  
🗑
Which of the following pieces of information would be classified as personal data? (Select three correct answers)   Social security number Driver license number Date and place of birth  
🗑
Why might internal security threats cause greater damage to an organization than external security threats?   Internal users have direct access to the infrastructure devices  
🗑
Which of the following is a key motivation of a white hat attacker?   Discovering weaknesses of networks and systems to improve the security level of these systems  
🗑
An individual user profile on a social network site is an example of an ______ identity. Online Offline   Online  
🗑
Cybersecurity is the ongoing effort to protect individuals, organizations and governments from digital attacks by protecting networked systems from harm. What level of cyber protection does each of the following factors require?   Your online identity – Personal A customer database – Organizational Economic stabilty – Government  
🗑
Your neighbor tells you that they don’t have an online identity. They have no social media accounts and only use the Internet to browse. Is your neighbor right?   No  
🗑
What are the foundational principles for protecting information systems as outlined in the McCumber Cube? (Choose three correct answers)   Integrity Availability Confidentiality  
🗑
Stuxnet malware was designed for which primary purpose?   To cause physical damage to equipment controlled by computers  
🗑
Which of the following examples illustrates how malware might be concealed?   An email is sent to the employees of an organization with an attachment that looks like an antivirus update, but the attachment actually consists of spyware  
🗑
What is the purpose of a rootkit?   To gain privileged access to a device while concealing itself  
🗑
What type of attack allows an attacker to use a brute-force approach? Denial of service Packet sniffing Social engineering Password cracking   Password Cracking  
🗑
What is the most common goal of search engine optimization (SEO) poisoning?   To increase web traffic to malicious sites  
🗑
What do you call a program written to take advantage of a known security vulnerability? An exploit Antivirus A firewall A software update   An exploit  
🗑
Which of the following security vulnerabilities could result in the receipt of malicious information that could force a program to behave in an unintended way?   Non-validated input  
🗑
A set of changes done to any program or application with the aim of updating, fixing or improving it is often referred to as what? A hack A patch An install A fix   A patch  
🗑
What is a miner?   A person that solves complex mathematical puzzles to verify a transaction  
🗑
What is the primary goal of a DoS attack?   To prevent the target server from being able to handle additional requests  
🗑
Which of the following should be carried out to address known software vulnerabilities of a specific application?   Install a security patch  
🗑
Which of the following characteristics describe a worm? (Select two correct answers)   Travels to new computers without any intervention or knowledge of the user Is self-replicating  
🗑
Who is responsible for overseeing a blockchain electronic ledger? A central bank Anyone belonging to the blockchain network A government regulatory body A central blockchain authority   Anyone belonging to the blockchain network  
🗑
Securing physical access to target equipment is an organization’s best defense against a cyber attack.’ Is this true or false?   True  
🗑
Where is cryptocurrency stored? In a wallet On an exchange In a bank account On the blockchain   In a wallet  
🗑
You have stored your data on a local hard disk. Which method would secure this data from unauthorized access?   Data encryption  
🗑
How can you keep your personal browsing history hidden from other users on a shared computer?   Operate the web browser in private browser mode  
🗑
Which type of technology can prevent malicious software from monitoring user activities, collecting personal information and producing unwanted pop-up ads on a user computer?   Antispyware  
🗑
Why do IoT devices pose a greater security risk than other computing devices on a network?   Most IoT devices do not receive frequent software updates  
🗑
What should you do in order to make sure that people you live with do not have access to your secure data?   Set up password protection  
🗑
Which of the following is an example of two factor authentication?   Your fingerprint and your password  
🗑
You're looking to print photos you saved on a cloud storage using third-party online printing service. After logging into it, you're automatically given access to the third-party printing service. What allowed this automatic authentication to occur?   The cloud storage service is an approved application for the online printing service  
🗑
You are having difficulty remembering passwords for all of your online accounts. What should you do?   Save the passwords in a centralized password manager program  
🗑
Which of the following is a requirement of a strong password?   Use special characters such as ! @ or $  
🗑
Which of the following passwords would most likely take the longest for an attacker to guess or break?   mk$$cittykat104#  
🗑
What is the best method to prevent Bluetooth from being exploited?   Always disable Bluetooth when it is not being used  
🗑
How can you prevent others from eavesdropping on network traffic when operating a PC on a public Wi-Fi hotspot?   Connect with a VPN service  
🗑
Which configuration on a wireless router is not considered to be adequate security for a wireless network?   Preventing the broadcast of an SSID  
🗑
Which technology removes direct equipment and maintenance costs from the user for data backups?   cloud service  
🗑
What is the only way of ensuring that deleted files on your computer are irrecoverable?   Physically destroying your computer’s hard drive  
🗑
What is the correct definition of risk management?   The process of identifying and assessing risk to reduce the impact of threats and vulnerabilities  
🗑
Which of the following tools can be used to provide a list of open ports on network devices? Ping Tracert Nmap Whois   NMap  
🗑
Which of the following tools can perform real-time traffic and port analysis, and can also detect port scans, fingerprinting and buffer overflow attacks?   Snort  
🗑
‘Today, there are single security appliances that will solve all the network security needs of an organization.’ Is this statement true or false?   False  
🗑
What name is given to a device that controls or filters traffic going in or out of the network?   Firewall  
🗑
What tool can identify malicious traffic by comparing packet contents to known attack signatures?   IDS  
🗑
What protocol is used to collect information about traffic traversing a network? HTTPS NetFlow Telnet NAT   Netflow  
🗑
Behavior-based analysis involves using baseline information to detect what? Risk Anomalies Backdoors Vulnerabilities   Anomalies  
🗑
What is the last stage of a pen test? Scanning Analysis and reporting Gathering target information Maintaining access   Analysis and Reporting  
🗑
What is a security playbook?   A collection of repeatable queries or reports that outline a standardized process for incident detection and response  
🗑
What is the main aim of a Cyber Security Incident Response Team (CSIRT)?   To help ensure organization, system and data preservation by performing investigations into computer security incidents  
🗑
How do Cisco ISE and TrustSec work?   They enforce access to network resources by creating role-based access control policies  
🗑
The risk management process consists of four steps. Can you put these in the right order?   1. Frame the risk 2. Assess the risk 3. Respond to the risk 4. Monitor the risk  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: cinnamonbr34d