Cybersecurity Final Exam
1 - What is cybersecurity?
the use of
satellites to spy on malicious users
efforts to
prevent people from becoming hackers
the act of
securing the Internet
the protection of cyberspace
2 - What is the purpose of a reconnaissance attack on a computer network?
to steal
data from the network servers
to redirect
data traffic so that it can be monitored
to prevent
users from accessing network resources
to gather information about the target network and system
3 - When an organization is developing
cybersecurity procedures, what else, besides technology, must be considered to
ensure that the procedures are effective?
user
authentication
closed
circuit TVs
user behavior
more
security personnel
4 - An attacker sends a piece of malware as an
email attachment to employees in a company. What is one probable purpose of the
attack?
searching and obtaining trade secrets
cracking
the administrator password for a critical server
probing
open ports on the firewall on the border network
denying
external access to a web server that is open to the public
5 - When describing malware, what is a difference
between a virus and a worm?
A virus
focuses on gaining privileged access to a device whereas a worm does not.
A virus can
be used to deliver advertisements without user consent whereas a worm cannot.
A virus replicates itself by attaching to another file whereas a worm
can replicate itself independently.
A virus can
be used to launch a DoS attack (but not a DDoS), but a worm can be used to launch
both DoS and DDoS attacks.
6 - Which example illustrates how malware might
be concealed?
A worm is
launched with the objective of deleting key operating system files on company
file and web servers.
A virus
spreads in an organization with the objective to obtain the email contacts from
employee workstations.
An attack
is launched against a public website of an online retailer with the objective
of blocking its response to visitors.
An email is sent to the employees of an organization with an attachment
that looks like an antivirus update, but the attachment actually consists of
spyware.
7 - Fill in the blank.
You need to
put the word: Cybersecurity
8 - What type of attack uses multiple sources
in an effort to render a target system unusable?
spam
phishing
DDoS
cyberfraud
9 - What type of software are Zeus and SpyEye
classified as?
malware
DDoS
launcher
antiphishing
software
intrusion
detection applications
10 - What was the first banking technology that
used a PIN to authenticate customers?
Internet
banking
Mobile
banking
Computer
banking
automatic teller machines
11 - True or False? Phone phreaking was the
start of what is known as hacking.
true
false
12 - What is an example of cyber kill chain?
a group of
botnets
a planned process of cyberattack
a series of
worms based on the same core code
a
combination of virus, worm, and Trojan Horse
13 - True or False? Losing data to an attacker can cause more damage to a company than losing money can.
true
false
14 - What device passively monitors network
traffic for anomalies that can indicate an attack?
switch
IDS
bridge
web proxy
15 - What is cyberwarfare?
It is an
attack only on military targets.
It is an attack designed to disrupt, corrupt, or exploit national
interests.
It is an
attack on a major corporation.
It is an
attack that only involves robots and bots.
16 - True or False? In wartime, cyberattacks are considered a criminal
act, not an act of war.
true
false
17 - What is the best method of information
gathering and analysis when tracking a global security threat?
using
historical data
using real-time data
using
tracking reports
using a
honeynet or honeypot
18 - What term is used to describe a single
threat that represents multiple types of attack?
vector
attack
blended threat
virus
attack
diversified
threat
19 - True or False? Security conscious organizations
are safe from cyberattacks.
true
false
20
The Correct Answer: Architecture
21 - Who is responsible for enabling and
maintaining a secure environment within a large organization?
only the IT
department
all of the
customers and clients of the organization
Only the
Chief Security Officer
employees at all levels within the organization
only the
Chief Operations Officer
22 - What are two reasons that medical devices
are easily compromised and hacked? (Choose two.)
Many
medical devices have plastic covers that make them more susceptible to wireless
hacking.
Medical
devices do not require passwords so that they are easier for the patients to
operate.
Up to now, security has not been the main concern of the medical
industry.
Data
retrieved from the medical devices is stored in the cloud.
Many medical devices rely on wireless technology and they are not all
capable of supporting strong encryption.
Most
medical devices use low power CPU that cannot handle data encryption.
23 - What is a concern when a company has a
cloud-based infrastructure as part of its IT infrastructure?
Email
becomes more prone to attack.
Software as
a service (SaaS) is not easy to implement.
The company shares the security footprint with other companies.
More
downtime is possible as a result of the borderless infrastructure.
24 - A company uses a cloud-based payroll
system. Which cloud computing technology is this company using?
browser as a service (BaaS)
infrastructure as a service (IaaS)
software as a service (SaaS)
wireless as
a service (WaaS)
25 - What was used as a cyberwarfare weapon to
attack a uranium enrichment facility in Iran?
DDoS
PSYOPS
Stuxnet
SQL
injection
alguien ha comprobado si estas preguntas se corresponden con las reales?
ResponderEliminarTe confirmo que estan actualizadas.
ResponderEliminardon´t we have the version 2.0?
ResponderEliminarPlease, I need the answers of version 2.0
EliminarEste comentario ha sido eliminado por el autor.
EliminarCyber Security-These days the danger of victimisation on-line ways that for doing business, creating payments and alternative on-line transactions have gotten higher day by day owing to varied problems and threats from cyber criminals and hackers. They not solely steal cash from your account however additionally steal al your direction and alternative vital information which may facilitate them ruin your company, business or its name. Cyber security has become one in every of the a lot of required things in today's date because the increase in cyber crimes and cyber threats area unit increasing day by day.
ResponderEliminarel examen dice que trae 50 preguntas
ResponderEliminarEste comentario ha sido eliminado por el autor.
EliminarPls may you help me to get practice questions and answers for cisco cyber security scholarship exam, I will be writing it soon?
ResponderEliminarLa versión 2
ResponderEliminarpara cuando la versión 2?
ResponderEliminartanks man
ResponderEliminarEste comentario ha sido eliminado por el autor.
ResponderEliminarGet the most VMware 3V0-632 exam questions and answers and practice test from CertificationGenie
ResponderEliminarLatest VMware 3V0-632 exam questions Answer and practice softwear. Visit For More Detail:
http://www.imfaceplate.com/CertificationGenie/check-if-you-are-ready-to-pass-400101-cisco-ccie-routing-switching-exam-or-not/
Your online diaries propel more each else volume is so captivating further serviceable It chooses me happen for pull back repeat. I will in a blaze grab your reinforce to stay instructed of any updates. find a hacker online
ResponderEliminarHere is Mr Benjamin contact Email details,lfdsloans@outlook.com. / lfdsloans@lemeridianfds.com Or Whatsapp +1 989-394-3740 that helped me with loan of 90,000.00 Euros to startup my business and I'm very grateful,It was really hard on me here trying to make a way as a single mother things hasn't be easy with me but with the help of Le_Meridian put smile on my face as i watch my business growing stronger and expanding as well.I know you may surprise why me putting things like this here but i really have to express my gratitude so anyone seeking for financial help or going through hardship with there business or want to startup business project can see to this and have hope of getting out of the hardship..Thank You.
ResponderEliminarLas Vegas, NV - Mapyro
ResponderEliminarFree 여수 출장마사지 Parking - LAS 광주광역 출장안마 VEGAS CASINO 울산광역 출장안마 RESORT - 3121 Las Vegas Boulevard South, 춘천 출장샵 Las Vegas, NV 제주 출장마사지 89109. (877) 770-3425.