Introduction to Cybersecurity: Course Final Exam Flashcards
(77 cards)
Which of the following firewalls hides or masquerades the private addresses of network hosts?
Reverse proxy firewall
Host-based firewall
Proxy server
Network address
translation firewall
Network layer firewall
Network Address Translation Firewall
Carrying out a multi-phase, long-term, stealthy and advanced operation against a specific target is often referred to as what?
Advanced persistent treat
Network sniffing
Social engineering
Script kiddies
Rainbow tables
Advanced persistent threat
You are configuring access settings to require employees in your organization to authenticate first before accessing certain web pages. Which requirement of information security is addressed through this configuration?
Scalability
Avaiability
Integrity
Confidentiality
Confidentiality
What are the objectives of ensuring data integrity? (Choose two correct answers)
Data is unaltered during transit
Data is not changed by unauthorized entities
Data is encrypted while in transit and when stored on disks
Access to the data is authenticated
Data is available all the time
Data is unaltered during transit
Data is not changed by unauthorized entities
An organization is experiencing overwhelming visits to a main web server. You are developing a plan to add a couple of more web servers for load balancing and redundancy. Which requirement of information security is addressed by implementing the plan?
Scalability
Integrity
Confidentiality
Availability
Availability
What of the following are examples of cracking an encrypted password? (Choose four correct answers)
Imtimidation
Brute force attack
Network sniffing
Rainbow tables
Social engineering
Spraying
Dictionary attack
Brute Force Attack
Rainbow Tables
Spraying
Dictionary Attack
Improper management of physical access to a resource, such as a file, can lead to what type of security vlnerability?
Weaknesses in security practices
Race conditions
Access Control problems
Buffer overlow
Non-validated input
Access Control problems
A medical office employee sends emails to patients about their recent visits to the facility. What information would put the privacy of the patients at risk if it was included in the email?
Contact information
Next appointment
Patient records
First and last name
Patient records
What is the best way to avoid getting spyware on a machine?
Install the latest antivirus updates
Install the latest web browser updates
Install software only from trusted websites
Install the latest operating system updates
Install software only from trusted websites
ou are surfing the Internet using a laptop at a public Wi-Fi cafe. What should you check first before you connect to the public network?
That the Bluetooth adapter is disabled
If the laptop requires user authentication for file and media sharing
That the laptop web browser is operating in private mode
If the laptop has a master password set to secure the passwords stored in the password manager
If the laptop requires user authentication for file and media sharing
What is the main function of the Cisco Security Incident Response Team?
To design next generation routers and switches that are less prone to cyber attacks
To design polymorphic malware
To ensure company, system and data preservation
To provide standards for new encrpytion techniques.
To ensure company, system and data preservation
Which of the following firewalls are placed in front of web services to protect, hide, offload and distribute access to web servers?
Appication layer firewall
proxy server
Transport layer firewall
Network layer firewall
Reverse proxy server
Reverse proxy server
Which of the following certifications meets the U.S. Depratment of Defensive Directive 8570.01-M reuqirements, which is important for anyone looking to work in IT security for the federal goverment?
EC Council Certified Ethnical hacker
Microsoft Technology Associate Security Fundamentals
ISACA CSX Cybersecurity Fundamentals
CompTIA Security+
ISC2 Certified Information Systems Security Professional
Palo Alto Networks Certified Cybersecurity Associate
CompTIA Security+
One of your colleagues has lost her identification badge. She is in a hurry to get to a meeting and does not have time to visit Human Resources to get a temporary badge. You lend her your identification badge until she can obtain a replacement.
Is this behavior ethical or unethical?
Ethical
Unethical
Unethical
Which of the following certifications tests your understanding and knowledge in how to look for weaknesses and vulnerabilities in target systems using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner?
Palo Alto Networks Certified Cybersecurity Associate
ISC2 Certified Information Systems Security Professional
Microsoft Technology Associate Security Fundamentals
CompTIA Security+
ISACA CSX Cybersecurity Fundamentals
EC Council Certified Ethical Hacker
EC Council Certified Ethical Hacker
What is the main purpose of cyberwarfare?
To develop advanced network devices
To gain advanced over adversaries
To protect cloud-based data centers
To simulate possible war scenarios among nations
To gain advantage over adversaries
What vulnerability occurs when the output of an event depends on ordered or timed outputs?
Weaknesses in security practices
Non-validated input
Race conditions
Buffer overflow
Access control problems
Race conditions
What do you call the vulnerabilities discovered by Google security researchers that affect almost all CPUs released since 1995? (Select two correct answers)
Shell shock
WannaCry
NotPetva
Spectre
Meltdown
Spectre
Meltdown
If developers attempt to create their own security algorithms, it will likely introduce what type of vulnerabilities?
Buffer overflow
Race conditions
Weaknesses in security practices
Non-validated input
Access control problems
Weaknesses in security practices
Whcih technology creates a security token that allows a user to log in to a desired web appication using credentials from a social media website?
Open authorization
VPN service
Password manager
In-private browsing mode3
Open authorization
Which of the following security implementations use biometrics? (Choose two correct answers)
Fingerprint
Phone
Credit card
Voice recognition
Fob
Fingerprint
Voice recognition
Which of the following firewalls filters traffic based on source and destination IP addresses?
Network layer firewall
Proxy server
Application layer firewall
Transport layer firewall
Network address translation firewall
Network layer firewall
Whcih of the following firewalls filters web content requests such as URLs and domain names?
Application layer firewall
Proxy server
Reverse proxy server
Network layer firewall
Network address translation firewall
Proxy server
A port scan returns a ‘dropped’ response. What does this mean?
A service is listening ont he port
Connections to the port will be denied
There was no reply from the host
There was no reply from the host