Final Exam MCQs Flashcards

(64 cards)

1
Q

Can disaster recovery be a task for the information security department/division?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Can applications like John the Ripper crack passwords by looking on the Internet for matches?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

In addition to access control, what is important?

A

Authentication

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What can SQL injection attacks be prevented by?

A

Using input validation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why were we able to see the password in the lab even though the FTP authentication was not successful?

A

The packet submitted the password in clear text

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Is a URL/FQDN only used for accessing websites?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What can hackers use the whois command for?

A

Pinpoint a person to socially engineer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How can DNS be secured?

A

All of the Above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does an SSL certificate assure?

A

That the site is valid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

If your host wants to access the site www.thestockmans.net, who does it first ask for the IP address?

A

The host’s assigned DNS server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is SQL Injection?

A

An attack exploited through a webpage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Does HTTP use a different port than HTTPS?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Does formatting a drive on your computer immediately remove the files from the disk?

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

How do hosts map an IP address to a MAC address for LAN traffic?

A

By querying its locally stored arp cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

At which layer is a MAC address used?

A

Layer 2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How are packets addressed on a LAN?

A

Using MAC addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is used once something goes across LANs?

A

IP addresses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is running a nmap scan on a network often considered?

A

A violation of the network use policy

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

How do we enable ingress filtering?

A

By blocking incoming SYN packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What do host-based firewalls do?

A

Block incoming network traffic into our system; since it blocks ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

When accessing a website, what will your computer generally connect with?

A

All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What mechanisms can reduce the insider threat?

A

Proper monitoring and logging of system usage, tracking employee satisfaction, applying the process of least privileges

Therefore, all of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is encryption used to assure?

A

Confidentiality, Identity, Integrity

Therefore, all the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What are zero day vulnerabilities?

A

Previously unknown vulnerabilities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What does PII stand for?
Personally Identifiable Information
26
What is segmenting a network an example of?
Defense in Depth
27
What is meant by 'endpoint security'?
Security of the computer systems connected to the network
28
What are CVEs?
Known software/system vulnerabilities
29
What does ACL stand for?
Access Control List
30
What is the Target data breach an example of?
An attack on confidentiality
31
What does the phrase least privilege in cybersecurity refer to?
Only providing the level of access required for each person
32
Should following the NIST 800-53 specifications for cybersecurity reduce the risk of an organizational issue?
True
33
Does a password breach at LinkedIn impact every organization’s security?
True
34
Why is identifying assets important in cybersecurity?
So we can identify vulnerabilities in/of each asset
35
Why should risk assessments be used in addition to compliance adherence and standards?
Risks may be specific to your organization
36
How can a key-logger steal passwords?
By intercepting the password prior to encryption
37
Why is it important to understand web servers and traffic as an information and security professional?
Web sites provide an entry for hackers
38
What problem does Shadow IT create?
Corporate data could end up on unsupervised systems, it can waste money, non-IT users may not configure security correctly ## Footnote Therefore, it’s all of the above
39
What can the nmap command do?
Check for open ports on a network, check for open ports on a host, can be directed to systems on other subnets ## Footnote Therefore, it’s all of the above
40
Dynamic web servers require more attention to security than static web servers?
True, because they have logins and access to data that need to be checked
41
What is another name for a URL?
The host’s fully qualified domain name
42
What are the factors in multi-factor authentication?
Something you know, password; Something you are, face ID; Something you have, phone ## Footnote Therefore, it’s all of the above
43
If a user has RW permissions set locally but the share permissions are Everyone-Read. The user's access to the share will be...
Read, because it is the most restrictive
44
To send something to a different LAN, a host...
sends packets to the MAC address of the router
45
The tracert command
shows the routers that packets go through to reach a destination host
46
Wan traffic works in
Layer 3
47
If attackers have no physical access to our networks, we do not have to worry about ARP poisoning
False
48
MAC addresses (48 bits)...
are how packets are addressed on a LAN
49
255.255.255.0 and /24
tells a system the same thing
50
Rogue DHCP servers...
could be a man-in-the-middle attack vector, can be created when a user plugs in their own device into the network, can cause fewer incidents with a segmented network, therefore, all of the above
51
The order of the TCP three way handshake is
SYN SYN/ACK ACK
52
Signal messages can be obtained by law enforcement even if they have been deleted
False
53
How can hackers obtain your encrypted messages (Signal, Whatsapp)?
Having malware installed on one of the devices in the chat
54
When you open a web browser and go to bsky.app for the first time, the first packet sent from your computer will likely be...
a dns request packet to your dns server
55
On a web server, which port should generally NOT be opened on its firewall?
53
56
In addition to access control, authentication is important...
to audit user actions on systems
57
EDR is...
protection (AV etc.) of computers in our network
58
A dictionary attack...
decreases the time it takes to crack passwords
59
Password managers are useful because they...
create unique passwords for different accounts
60
In cryptography, the cipher is...
the algorithm used to encrypt/decrypt
61
Symetric encryption...
uses a shared private key
62
SSL certificates assure...
confidentiality and identity
63
Most encryption and hashing algorithms used in computing...
are publicly known
64
In asymetric encryption...
private and public keys are combined