jueves, 9 de junio de 2016

Cybersecurity Final Exam

Cybersecurity Final Exam






1 - What is cybersecurity?
the use of satellites to spy on malicious users
efforts to prevent people from becoming hackers
the act of securing the Internet
the protection of cyberspace

2 - What is the purpose of a reconnaissance attack on a computer network?
to steal data from the network servers
to redirect data traffic so that it can be monitored
to prevent users from accessing network resources
to gather information about the target network and system

3 - When an organization is developing cybersecurity procedures, what else, besides technology, must be considered to ensure that the procedures are effective?
user authentication
closed circuit TVs
user behavior
more security personnel

4 - An attacker sends a piece of malware as an email attachment to employees in a company. What is one probable purpose of the attack?
searching and obtaining trade secrets
cracking the administrator password for a critical server
probing open ports on the firewall on the border network
denying external access to a web server that is open to the public


5 - When describing malware, what is a difference between a virus and a worm?
A virus focuses on gaining privileged access to a device whereas a worm does not.      
A virus can be used to deliver advertisements without user consent whereas a worm cannot.
A virus replicates itself by attaching to another file whereas a worm can replicate itself independently.
A virus can be used to launch a DoS attack (but not a DDoS), but a worm can be used to launch both DoS and DDoS attacks.

6 - Which example illustrates how malware might be concealed?
A worm is launched with the objective of deleting key operating system files on company file and web servers.
A virus spreads in an organization with the objective to obtain the email contacts from employee workstations.
An attack is launched against a public website of an online retailer with the objective of blocking its response to visitors.
An email is sent to the employees of an organization with an attachment that looks like an antivirus update, but the attachment actually consists of spyware.

7 - Fill in the blank.
You need to put the word: Cybersecurity

8 - What type of attack uses multiple sources in an effort to render a target system unusable?
spam
phishing
DDoS
cyberfraud

9 - What type of software are Zeus and SpyEye classified as?
malware
DDoS launcher 
antiphishing software
intrusion detection applications

10 - What was the first banking technology that used a PIN to authenticate customers?
Internet banking
Mobile banking
Computer banking
automatic teller machines

11 - True or False? Phone phreaking was the start of what is known as hacking.
true
false

12 - What is an example of cyber kill chain?
a group of botnets
a planned process of cyberattack
a series of worms based on the same core code
a combination of virus, worm, and Trojan Horse


13 - True or False?  Losing data to an attacker can cause more damage to a company than losing money can.
true
false

14 - What device passively monitors network traffic for anomalies that can indicate an attack?
switch
IDS
bridge
web proxy

15 - What is cyberwarfare?
It is an attack only on military targets.
It is an attack designed to disrupt, corrupt, or exploit national interests.            
It is an attack on a major corporation.
It is an attack that only involves robots and bots.

16 - True or False?  In wartime, cyberattacks are considered a criminal act, not an act of war.
true
false

17 - What is the best method of information gathering and analysis when tracking a global security threat?
using historical data
using real-time data
using tracking reports
using a honeynet or honeypot

18 - What term is used to describe a single threat that represents multiple types of attack?
vector attack
blended threat
virus attack       
diversified threat

19 - True or False? Security conscious organizations are safe from cyberattacks.
true      
false

20

The Correct Answer: Architecture

21 - Who is responsible for enabling and maintaining a secure environment within a large organization?
only the IT department
all of the customers and clients of the organization
Only the Chief Security Officer
employees at all levels within the organization
only the Chief Operations Officer

22 - What are two reasons that medical devices are easily compromised and hacked? (Choose two.)
Many medical devices have plastic covers that make them more susceptible to wireless hacking.
Medical devices do not require passwords so that they are easier for the patients to operate.
Up to now, security has not been the main concern of the medical industry.
Data retrieved from the medical devices is stored in the cloud.
Many medical devices rely on wireless technology and they are not all capable of supporting strong encryption.
Most medical devices use low power CPU that cannot handle data encryption.

23 - What is a concern when a company has a cloud-based infrastructure as part of its IT infrastructure?
Email becomes more prone to attack.
Software as a service (SaaS) is not easy to implement.
The company shares the security footprint with other companies.
More downtime is possible as a result of the borderless infrastructure.

24 - A company uses a cloud-based payroll system. Which cloud computing technology is this company using?
browser as a service (BaaS)
infrastructure as a service (IaaS)
software as a service (SaaS)
wireless as a service (WaaS)
               
25 - What was used as a cyberwarfare weapon to attack a uranium enrichment facility in Iran?
DDoS
PSYOPS               
Stuxnet              
SQL injection

17 comentarios:

  1. alguien ha comprobado si estas preguntas se corresponden con las reales?

    ResponderEliminar
  2. Te confirmo que estan actualizadas.

    ResponderEliminar
  3. Respuestas
    1. Please, I need the answers of version 2.0

      Eliminar
    2. Este comentario ha sido eliminado por el autor.

      Eliminar
  4. Cyber Security-These days the danger of victimisation on-line ways that for doing business, creating payments and alternative on-line transactions have gotten higher day by day owing to varied problems and threats from cyber criminals and hackers. They not solely steal cash from your account however additionally steal al your direction and alternative vital information which may facilitate them ruin your company, business or its name. Cyber security has become one in every of the a lot of required things in today's date because the increase in cyber crimes and cyber threats area unit increasing day by day.

    ResponderEliminar
  5. el examen dice que trae 50 preguntas

    ResponderEliminar
  6. Pls may you help me to get practice questions and answers for cisco cyber security scholarship exam, I will be writing it soon?

    ResponderEliminar
  7. Este comentario ha sido eliminado por el autor.

    ResponderEliminar
  8. Get the most VMware 3V0-632 exam questions and answers and practice test from CertificationGenie
    Latest VMware 3V0-632 exam questions Answer and practice softwear. Visit For More Detail:
    http://www.imfaceplate.com/CertificationGenie/check-if-you-are-ready-to-pass-400101-cisco-ccie-routing-switching-exam-or-not/

    ResponderEliminar
  9. Your online diaries propel more each else volume is so captivating further serviceable It chooses me happen for pull back repeat. I will in a blaze grab your reinforce to stay instructed of any updates. find a hacker online

    ResponderEliminar
  10. Here is Mr Benjamin contact Email details,lfdsloans@outlook.com. / lfdsloans@lemeridianfds.com Or Whatsapp +1 989-394-3740 that helped me with loan of 90,000.00 Euros to startup my business and I'm very grateful,It was really hard on me here trying to make a way as a single mother things hasn't be easy with me but with the help of Le_Meridian put smile on my face as i watch my business growing stronger and expanding as well.I know you may surprise why me putting things like this here but i really have to express my gratitude so anyone seeking for financial help or going through hardship with there business or want to startup business project can see to this and have hope of getting out of the hardship..Thank You.

    ResponderEliminar
  11. Las Vegas, NV - Mapyro
    Free 여수 출장마사지 Parking - LAS 광주광역 출장안마 VEGAS CASINO 울산광역 출장안마 RESORT - 3121 Las Vegas Boulevard South, 춘천 출장샵 Las Vegas, NV 제주 출장마사지 89109. (877) 770-3425.

    ResponderEliminar