Course Final Exam Flashcards
‘Internet-based cameras and gaming gear are not subject to security breaches.’
Is this statement true or false?
False
What is the main purpose of cyberwarfare?
(a) To gain advantage over adversaries
(b) To protect cloud-based data centers
(c) To protect cloud-based data centers
(d) To develop advanced network devices
To gain advantage over adversaries
An organization is experiencing overwhelming visits to a main web server. You are developing a plan to add a couple of more web servers for load balancing and redundancy.
Which requirement of information security is addressed by implementing the plan?
(a) Scalability
(b) Confidentiality
(c) Integrity
(d) Availability
Availability
Carrying out a multi-phase, long-term, stealthy and advanced operation against a specific target is often referred to as what?
(a) Advanced persistent threat
(b) Network sniffing
(c) Rainbow tables
(d) Social engineering
(e) Script kiddies
Advanced persistent threat
‘An advanced persistent threat (APT) is usually well funded.’
Is this statement true or false?
True
What type of attack uses zombies?
(a) Spear phishing
(b) DDoS
(c) SEO poisoning
(d) Trojan horse
DDoS
A medical office employee sends emails to patients about their recent visits to the facility.
What information would put the privacy of the patients at risk if it was included in the email?
(a) Patient records
(b) Contact information
(c) Next appointment
(d) First and last name
Patient records
You are surfing the Internet using a laptop at a public Wi-Fi cafe. What should you check first before you connect to the public network?
(a) That the Bluetooth adapter is disabled
(b) That the laptop web browser is operating in private mode
(c) If the laptop has a master password set to secure the passwords stored in the password manager
(d) If the laptop requires user authentication for file and media sharing
If the laptop requires user authentication for file and media sharing
What is the best way to avoid getting spyware on a machine?
(a) Install the latest operating system updates
(b) Install the latest antivirus updates
(c) Install software only from trusted websites
(d) Install the latest web browser updates
Install software only from trusted websites
Which of the following firewalls filters web content requests such as URLs and domain names?
(a) Reverse proxy server
(b) Network layer firewall
(c) Application layer firewall
(d) Proxy server
(e) Network address translation firewall
Proxy server
Which of the following firewalls filters traffic based on application, program or service?
(a) Context aware application firewall
(b) Host-based firewall
(c) Application layer firewall
(d) Network layer firewall
(e) Proxy server
Application layer firewall
Which of the following are commonly used port scanning applications?
Select two correct answers
(a) Sequence number
(b) Port number
(c) Zenmap
(d) Nmap
Zenmap & Nmap
Which of the following certifications tests your understanding and knowledge in how to look for weaknesses and vulnerabilities in target systems using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner?
(a) ISACA CSX Cybersecurity Fundamentals
(b) CompTIA Security+
(c) Microsoft Technology Associate Security Fundamentals
(d) ISC2 Certified Information Systems Security Professional
(e) Palo Alto Networks Certified Cybersecurity Associate
(e) EC Council Certified Ethical Hacker
EC Council Certified Ethical Hacker
One of your colleagues has lost her identification badge. She is in a hurry to get to a meeting and does not have time to visit Human Resources to get a temporary badge. You lend her your identification badge until she can obtain a replacement.
Is this behavior ethical or unethical?
Unethical
‘Cybersecurity certifications are a way for you to verify your skills and knowledge and can also boost your career.’
Is this statement true or false?
True