Cybersecurity v1.1 Module 5 Quiz 
This quiz covers the content of the videos presented in Cybersecurity
Module 5. This quiz is designed for practice. You will be allowed
multiple attempts and the grade does not appear in the gradebook.
There are multiple task types that may be available in this quiz. In some
task types, partial credit scoring is allowed to foster learning. Please note
that  on tasks with multiple answers, points can be deducted
for selecting incorrect options.
Short answer or essay questions may appear on
some of the quizzes. These questions are designed for self-assessment and
reflection and are not scored. Sample answers are provided
for self-evaluation.
At the completion of the quiz, some items may display feedback. The
feedback will reference the source of the content. Example: Refer to
curriculum topic: 1.2.0 - indicates that the source of the material for this
task is in module 1, presentation 2.
Pregunta  1
During a cyberwarfare attack, which group is responsible for disabling the
firewalls and IDS systems of the target? 
|  | 
offensive
  operations teams  | |
|  | 
internal
  users  | |
|  | 
backdoor
  team  | |
|  | 
defense
  suppression team  | |
Pregunta 2  
What are two key considerations in designing a cybersurveillance program? (Choose two.)
|  | 
that it be controllable remotely  | |
|  | 
that it have ability to communicate with different languages  | |
|  | 
that it be
  untraceable  | |
|  | 
that it have ability to launch a DDoS attack  | |
|  | 
that it be fault tolerant  | 
Pregunta 3 
What are the features of social network websites that make them a security threat to users?
|  | 
The sites inspect email, making it impossible to maintain privacy.  | |
|  | 
The sites are too user friendly, making it too simple to create fake
  accounts.  | |
|  | 
The sites use chat services that could be exploited to gain network
  access.  | |
|  | 
The sites make it easy to distribute malware and give the distributor
  statistics of the hits to expect.  | |
Pregunta 4   
Refer to the exhibit. In which section of the Cisco Security Intelligence Operations (SIO) is all of the threat information gathered?
|  | 
SensorBase
   | |
|  | 
Dynamic
  Updates  | |
|  | 
Threat
  Operations Center  | 
Pregunta 5 
Which security threat method would be used to target a specific demographic
such as government workers for a particular country? 
|  | 
cloud
  computing  | |
|  | 
cyberwar  | |
|  | 
search engine optimization (SEO) poisoning  | |
|  | 
money
  mules  | |
Pregunta 6  
True or False?
Cyberwarfare can be launched by a small group of highly skilled attackers.
Cyberwarfare can be launched by a small group of highly skilled attackers.
|  | 
false  | |
|  | 
true | |
 



 
No hay comentarios:
Publicar un comentario