jueves, 9 de junio de 2016

Cisco Cybersecurity

Course Summary

A series of engaging presentations and panel discussions, the Introduction to Cybersecurity course covers the importance of cybersecurity, the most common risks, and how to mitigate them.
  • Learn what cybersecurity is and how the industry is growing.
  • Understand how attackers use malware and how to protect individuals from attack.
  • Learn about threats in banking, telecommunications, healthcare, other industries, and across borders.
  • Understand technology-based solutions and strategic and network-architecture planning.
  • Study at your own pace and reinforce your understanding with activities and quizzes.
  • Connect with the global Cisco Networking Academy community.
You can Join to this Course in the next URL: https://www.netacad.com/courses/intro-cybersecurity/


Cybersecurity Final Exam

Cybersecurity Final Exam






1 - What is cybersecurity?
the use of satellites to spy on malicious users
efforts to prevent people from becoming hackers
the act of securing the Internet
the protection of cyberspace

2 - What is the purpose of a reconnaissance attack on a computer network?
to steal data from the network servers
to redirect data traffic so that it can be monitored
to prevent users from accessing network resources
to gather information about the target network and system

3 - When an organization is developing cybersecurity procedures, what else, besides technology, must be considered to ensure that the procedures are effective?
user authentication
closed circuit TVs
user behavior
more security personnel

4 - An attacker sends a piece of malware as an email attachment to employees in a company. What is one probable purpose of the attack?
searching and obtaining trade secrets
cracking the administrator password for a critical server
probing open ports on the firewall on the border network
denying external access to a web server that is open to the public


5 - When describing malware, what is a difference between a virus and a worm?
A virus focuses on gaining privileged access to a device whereas a worm does not.      
A virus can be used to deliver advertisements without user consent whereas a worm cannot.
A virus replicates itself by attaching to another file whereas a worm can replicate itself independently.
A virus can be used to launch a DoS attack (but not a DDoS), but a worm can be used to launch both DoS and DDoS attacks.

6 - Which example illustrates how malware might be concealed?
A worm is launched with the objective of deleting key operating system files on company file and web servers.
A virus spreads in an organization with the objective to obtain the email contacts from employee workstations.
An attack is launched against a public website of an online retailer with the objective of blocking its response to visitors.
An email is sent to the employees of an organization with an attachment that looks like an antivirus update, but the attachment actually consists of spyware.

7 - Fill in the blank.
You need to put the word: Cybersecurity

8 - What type of attack uses multiple sources in an effort to render a target system unusable?
spam
phishing
DDoS
cyberfraud

9 - What type of software are Zeus and SpyEye classified as?
malware
DDoS launcher 
antiphishing software
intrusion detection applications

10 - What was the first banking technology that used a PIN to authenticate customers?
Internet banking
Mobile banking
Computer banking
automatic teller machines

11 - True or False? Phone phreaking was the start of what is known as hacking.
true
false

12 - What is an example of cyber kill chain?
a group of botnets
a planned process of cyberattack
a series of worms based on the same core code
a combination of virus, worm, and Trojan Horse


13 - True or False?  Losing data to an attacker can cause more damage to a company than losing money can.
true
false

14 - What device passively monitors network traffic for anomalies that can indicate an attack?
switch
IDS
bridge
web proxy

15 - What is cyberwarfare?
It is an attack only on military targets.
It is an attack designed to disrupt, corrupt, or exploit national interests.            
It is an attack on a major corporation.
It is an attack that only involves robots and bots.

16 - True or False?  In wartime, cyberattacks are considered a criminal act, not an act of war.
true
false

17 - What is the best method of information gathering and analysis when tracking a global security threat?
using historical data
using real-time data
using tracking reports
using a honeynet or honeypot

18 - What term is used to describe a single threat that represents multiple types of attack?
vector attack
blended threat
virus attack       
diversified threat

19 - True or False? Security conscious organizations are safe from cyberattacks.
true      
false

20

The Correct Answer: Architecture

21 - Who is responsible for enabling and maintaining a secure environment within a large organization?
only the IT department
all of the customers and clients of the organization
Only the Chief Security Officer
employees at all levels within the organization
only the Chief Operations Officer

22 - What are two reasons that medical devices are easily compromised and hacked? (Choose two.)
Many medical devices have plastic covers that make them more susceptible to wireless hacking.
Medical devices do not require passwords so that they are easier for the patients to operate.
Up to now, security has not been the main concern of the medical industry.
Data retrieved from the medical devices is stored in the cloud.
Many medical devices rely on wireless technology and they are not all capable of supporting strong encryption.
Most medical devices use low power CPU that cannot handle data encryption.

23 - What is a concern when a company has a cloud-based infrastructure as part of its IT infrastructure?
Email becomes more prone to attack.
Software as a service (SaaS) is not easy to implement.
The company shares the security footprint with other companies.
More downtime is possible as a result of the borderless infrastructure.

24 - A company uses a cloud-based payroll system. Which cloud computing technology is this company using?
browser as a service (BaaS)
infrastructure as a service (IaaS)
software as a service (SaaS)
wireless as a service (WaaS)
               
25 - What was used as a cyberwarfare weapon to attack a uranium enrichment facility in Iran?
DDoS
PSYOPS               
Stuxnet              
SQL injection

Cybersecurity v1.1 Pre-Test



Cybersecurity v1.1  Pre-Test


1 - What is a concern when a company has a cloud-based infrastructure as part of its IT infrastructure?
The company shares the security footprint with other companies.
More downtime is possible as a result of the borderless infrastructure.
Software as a service (SaaS) is not easy to implement.
Email becomes more prone to attack.

2 - True or False?
A computer teacher posted a photo on a social media site. Later, the teacher decided to close the account on the social media site. The teacher deleted all the content posted on the site including media and links. The teacher then canceled the account. The photo is now no longer accessible on the Internet.
true
false

3 - Traditionally, network personnel have the mindset of protecting the network border. What changes may be necessary when software as a service (SaaS) is used?
Manipulated data must be static.
Email must be protected to a greater degree.
Security policies may need to be different if the data travels through the cloud.
Social network site access time is greatly degraded due to the amount of processing required for the SaaS application being in the cloud.

4 - When describing malware, what is a difference between a virus and a worm?
A virus replicates itself by attaching to another file whereas a worm can replicate itself independently.
A virus focuses on gaining privileged access to a device whereas a worm does not.
A virus can be used to deliver advertisements without user consent whereas a worm cannot.
A virus can be used to launch a DoS attack (but not a DDoS), but a worm can be used to launch both DoS and DDoS attacks.

5 -  Which website is considered secure because it encrypts the communication between the website and visitors?
http://www.thebanks.com/
ftp://download.openproject.net/
https://www.ourblogs.info/
http://www.secureaccess.com:8080/

6 - Which three features of data is cybersecurity primarily concerned with?
confidentiality
integrity
manageability
availability
scalability
usability

7 - What device passively monitors network traffic for anomalies that can indicate an attack?
IDS
switch
bridge
web proxy

8 - What is cybersecurity?
the use of satellites to spy on malicious users
efforts to prevent people from becoming hackers
the act of securing the Internet
the protection of cyberspace

9 -   What technology can be used to secure data as it travels across the public Internet?
VPN
WPA
CSMA/CD
WEP

10 - What is the purpose of a broadcast address?
to identify all hosts within a collision domain
to identify a specific group of hosts on a network
to identify all hosts within a specific network
to identify a single host

11 - Which two types of applications rely on their traffic having priority over other traffic types through the network? (Choose two.)
file transfer
instant messaging
video
voice
email

12 - What is the purpose of the routing process?
to encapsulate data that is used to communicate across a network
to select the paths that are used to direct traffic to destination networks
to convert a URL name into an IP address
to provide secure Internet file transfer
to forward traffic on the basis of MAC addresses

13 - Which two components are necessary for a wireless client to be installed on a WLAN? (Choose two.)
wireless bridge
wireless NIC
crossover cable
media
wireless client software
custom adapter

14 - What two default wireless router settings can affect network security? (Choose two.)
The SSID is broadcast.
MAC address filtering is enabled.
WEP encryption is enabled.
The wireless channel is automatically selected.
A well-known administrator password is set.

15 - What is the purpose of the network security authentication function?
to require users to prove who they are
to determine which resources a user can access
to keep track of the actions of a user
to provide challenge and response questions

16 – Drag and Drop
17 - Which network device makes forwarding decisions based on the destination MAC address that is contained in the frame?
hub
switch
router
repeater
18 - Drag and Drop
 

 19 - Which network protocol is used to automatically assign an IP address to a computer on a network?
SMTP
APIPA
DHCP
ICMP
FTP

20 - Which layer of the OSI model defines logical addressing?
transport
application
presentation
network
data link
session

Cybersecurity v1.1 Module 7 Quiz



Cybersecurity v1.1 Module 7 Quiz


This quiz covers the content of the videos presented in Cybersecurity Module 7. This quiz is designed for practice. You will be allowed multiple attempts and the grade does not appear in the gradebook.
There are multiple task types that may be available in this quiz. In some task types, partial credit scoring is allowed to foster learning. Please note that  on tasks with multiple answers, points can be deducted for selecting incorrect options.
Short answer or essay questions may appear on some of the quizzes. These questions are designed for self-assessment and reflection and are not scored. Sample answers are provided for self-evaluation.
At the completion of the quiz, some items may display feedback. The feedback will reference the source of the content. Example: Refer to curriculum topic: 1.2.0 - indicates that the source of the material for this task is in module 1, presentation 2.Principio del formulario
 
Pregunta 1   

What is one way to deter hackers from attacking medical devices?
Create a firewall within the device.
Do not allow the device to connect to the Internet.

Ensure that the device cannot be taken out of the hospital.
Use an electrical mechanism that provides an electrical shock to any attacker.


Pregunta 2   
Why do some medical devices not use WPA2 for wireless network security?
Manufacturers are afraid WPA2 will expose their devices to hackers.
Medical devices lack the memory and processing power required to use WPA2.

Hospitals do not employ personnel who are qualified to implement WPA2.
Medical devices that use WPA2 can create long network delays.


Pregunta 3   
What is cybernetics?
the use of technology to create films
the use of the Internet to send messages

the use of video techniques to create superheroes
the use of medical devices to augment the functions of the human body


Pregunta 4
What type of wireless protocols should be used by medical devices?
open-standard protocols, because they use strong security methods
proprietary protocols, because they are less likely to be understood and targeted by hackers

high-speed wireless protocols, because high data throughput is required by medical devices
TCP, because the SYN-ACK mechanism makes the protocol more secure than other protocols

personal-area network (PAN) protocols, because medical devices use sensors that are worn on the body


Pregunta 5   
True or False?
A life saving, technologically advanced medical device could be hacked and become a weapon.
true
false