Course Final Exam Flashcards

1
Q

‘Internet-based cameras and gaming gear are not subject to security breaches.’

Is this statement true or false?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the main purpose of cyberwarfare?

(a) To gain advantage over adversaries

(b) To protect cloud-based data centers

(c) To protect cloud-based data centers

(d) To develop advanced network devices

A

To gain advantage over adversaries

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

An organization is experiencing overwhelming visits to a main web server. You are developing a plan to add a couple of more web servers for load balancing and redundancy.

Which requirement of information security is addressed by implementing the plan?

(a) Scalability

(b) Confidentiality

(c) Integrity

(d) Availability

A

Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Carrying out a multi-phase, long-term, stealthy and advanced operation against a specific target is often referred to as what?

(a) Advanced persistent threat

(b) Network sniffing

(c) Rainbow tables

(d) Social engineering

(e) Script kiddies

A

Advanced persistent threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

‘An advanced persistent threat (APT) is usually well funded.’

Is this statement true or false?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What type of attack uses zombies?

(a) Spear phishing

(b) DDoS

(c) SEO poisoning

(d) Trojan horse

A

DDoS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A medical office employee sends emails to patients about their recent visits to the facility.

What information would put the privacy of the patients at risk if it was included in the email?

(a) Patient records

(b) Contact information

(c) Next appointment

(d) First and last name

A

Patient records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

You are surfing the Internet using a laptop at a public Wi-Fi cafe. What should you check first before you connect to the public network?

(a) That the Bluetooth adapter is disabled

(b) That the laptop web browser is operating in private mode

(c) If the laptop has a master password set to secure the passwords stored in the password manager

(d) If the laptop requires user authentication for file and media sharing

A

If the laptop requires user authentication for file and media sharing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the best way to avoid getting spyware on a machine?

(a) Install the latest operating system updates

(b) Install the latest antivirus updates

(c) Install software only from trusted websites

(d) Install the latest web browser updates

A

Install software only from trusted websites

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following firewalls filters web content requests such as URLs and domain names?

(a) Reverse proxy server

(b) Network layer firewall

(c) Application layer firewall

(d) Proxy server

(e) Network address translation firewall

A

Proxy server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following firewalls filters traffic based on application, program or service?

(a) Context aware application firewall

(b) Host-based firewall

(c) Application layer firewall

(d) Network layer firewall

(e) Proxy server

A

Application layer firewall

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following are commonly used port scanning applications?

Select two correct answers

(a) Sequence number

(b) Port number

(c) Zenmap

(d) Nmap

A

Zenmap & Nmap

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following certifications tests your understanding and knowledge in how to look for weaknesses and vulnerabilities in target systems using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner?

(a) ISACA CSX Cybersecurity Fundamentals

(b) CompTIA Security+

(c) Microsoft Technology Associate Security Fundamentals

(d) ISC2 Certified Information Systems Security Professional

(e) Palo Alto Networks Certified Cybersecurity Associate

(e) EC Council Certified Ethical Hacker

A

EC Council Certified Ethical Hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

One of your colleagues has lost her identification badge. She is in a hurry to get to a meeting and does not have time to visit Human Resources to get a temporary badge. You lend her your identification badge until she can obtain a replacement.

Is this behavior ethical or unethical?

A

Unethical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

‘Cybersecurity certifications are a way for you to verify your skills and knowledge and can also boost your career.’

Is this statement true or false?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly