Cybersecurity v1.1 Module 5 Quiz
This quiz covers the content of the videos presented in Cybersecurity
Module 5. This quiz is designed for practice. You will be allowed
multiple attempts and the grade does not appear in the gradebook.
There are multiple task types that may be available in this quiz. In some
task types, partial credit scoring is allowed to foster learning. Please note
that on tasks with multiple answers, points can be deducted
for selecting incorrect options.
Short answer or essay questions may appear on
some of the quizzes. These questions are designed for self-assessment and
reflection and are not scored. Sample answers are provided
for self-evaluation.
At the completion of the quiz, some items may display feedback. The
feedback will reference the source of the content. Example: Refer to
curriculum topic: 1.2.0 - indicates that the source of the material for this
task is in module 1, presentation 2.
Pregunta 1
During a cyberwarfare attack, which group is responsible for disabling the
firewalls and IDS systems of the target?
|
offensive
operations teams
|
|
|
internal
users
|
|
backdoor
team
|
|
|
defense
suppression team
|
Pregunta 2
What are two key considerations in designing a cybersurveillance program? (Choose two.)
|
that it be controllable remotely
|
|
|
that it have ability to communicate with different languages
|
|
that it be
untraceable
|
|
|
that it have ability to launch a DDoS attack
|
|
that it be fault tolerant
|
Pregunta 3
What are the features of social network websites that make them a security threat to users?
|
The sites inspect email, making it impossible to maintain privacy.
|
|
|
The sites are too user friendly, making it too simple to create fake
accounts.
|
|
The sites use chat services that could be exploited to gain network
access.
|
|
|
The sites make it easy to distribute malware and give the distributor
statistics of the hits to expect.
|
Pregunta 4
Refer to the exhibit. In which section of the Cisco Security Intelligence Operations (SIO) is all of the threat information gathered?
|
SensorBase
|
|
|
Dynamic
Updates
|
|
Threat
Operations Center
|
Pregunta 5
Which security threat method would be used to target a specific demographic
such as government workers for a particular country?
|
cloud
computing
|
|
|
cyberwar
|
|
search engine optimization (SEO) poisoning
|
|
|
money
mules
|
Pregunta 6
True or False?
Cyberwarfare can be launched by a small group of highly skilled attackers.
Cyberwarfare can be launched by a small group of highly skilled attackers.
|
false
|
|
|
true
|
No hay comentarios:
Publicar un comentario