Quiz Questions Flashcards

1
Q

Which of the following standards is most applicable to a company that utilizes any payment card for its operations?

A

PCI-DSS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What organizational plan is developed to deal with disasters and other difficult situations such as cyber-attacks, outages, or supply chain failures?

A

Business Continuity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What type of information could include addresses, date of birth, or social security numbers?

A

PII

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the choices below best describes an attack resulting from an unknown vulnerability exploit or a known vulnerability without a current patch?

A

Zero-day attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The Risk Management Framework is a flexible risk-based approach that integrates security, privacy, and cyber supply chain risk management into the system development life cycle. Which phase of the framework involves determining the applicable controls needed to reduce business risk to an acceptable level?

A

Select

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following is NOT considered a factor of risk?

A

Convenience because Cost, Mitigation and Threat are

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of professional is hired by organizations to legally hack into their networks and identify weak entry points?

A

Ethical Hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which organizational security team is responsible for providing security assessments outlining an organization’s system defense efficacy and resilience?

A

Red Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What risk response or treatment approach has been adopted when an organization decides to purchase insurance?

A

Transfer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What achievement is proof of technical knowledge backed by an industry-standard provider such as Microsoft or CompTIA?

A

Certification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following is a Linux kernel-mode component?

A

Drivers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following is an identity associated with a session for proper access control?

A

User Account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the purpose of a Demilitarized Zone (DMZ)?

A

To separate internal networks from untrusted external traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following network attacks causes a service to fail by flooding the target with traffic?

A

Denial of Service DOS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which control enables the creation of rules that allow or block traffic?

A

iptables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which network infrastructure type connects users and end devices located in a small area such as an office building?

A

Local Area Network (LAN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which state of data represents data that are actively being used?

A

Data in use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following can be accomplished using a firewall?

A

Monitoring and filtering network traffic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which Linux distro is specifically packaged for information security tasks such as security research or penetration testing?

A

Kali

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the first step to take when hardening a Linux system?

A

Determine server purpose and requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which is a likely cause of the continued issues related to the EternalBlue common vulnerabilities and exposures (CVE)?

A

Poor patch management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which term best describes actions taken to increase infrastructure security?

A

Hardening

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is a true statement about the Windows Operating System?

A

It has a folder-based file system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which term refers to the idea of moving security earlier in the Secure Software Development Lifecycle (SSDLC) to avoid downstream bugs and vulnerabilities?

A

Shift Left

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is the Open Web Application Security Project (OWASP)?
A community-driven organization focused on application security
26
Which term is the input vehicle for a server-side request forgery (SSRF) attack?
User-supplied URL
27
What is application fuzzing?
Automated data is injected into an app to test response and security.
28
Which term best describes the main attack method used in the SolarWinds attack?
Supply-chain attack
29
Which paired term is the primary security control deployed during the Identify and Plan stages of the SSDLC?
Communication and review
30
Which duty is the primary focus of data loss prevention (DLP)?
Preventing unauthorized sharing of privileged information
31
What type of hacker breaks into organization for personal gain?
Unethical hacker
32
What type of attack uses links in an email?
Phishing
33
Which type of network, below is a the internet considered to be?
WAN
34
Which attack involves sniffing data between two or more computers?
On-Path
35
Reviewing systems for possible weakness is called?
Vulnerability assessment
36
Select all that are involved in risk calculations
Risk Threat + Asset =Vulnerability
37
Which of the following is a type of antivirus?
ClamAV
38
What part of the CIA triad ensures that data hasn’t changed in transit?
Integrity
39
The primary use for NMAP tool is to scan network computers?
True
40
What type of team would a SOC analyst belong to?
Blue Team
41
Which government agency is part of DHS?
CISA
42
What tool can be used for password cracking?
Hydra
43
True or false OWASP is a government agency?
False they are non-profit
44
Multiple controls to protect an asset is called?
Defense in Depth
45
SSDLC involves?
Applications
46
Testing of code for constant improvement is called?
Shift Left
47
How would you harden a Linux server?
Remove unnecessary services
48
What does a firewall do?
Inspects and filters incoming traffic
49
What type of attack is based on a vendor’s equipment?
Supply Chain attack
50
The primary purpose of a router is?
Allow separate networks to communicate
51
What is one of the leading causes of KNOWN vulnerabilities being exploited?
Poor patch management
52
The most powerful account in Linux is?
Root
53
Something used to show potential employers your IT knowledge?
Certifications
54
VPN is used to secure data at rest?
False it secures data in transit
55
Which regulation involves software for medical use?
HIPPA
56
What does DLP stand for?
Data Loss Prevention
57
With proper planning, all vulnerabilities can be eliminated?
False
58
When hackers exploit a new software vulnerability it is know as?
Zero-day
59
What is network segmentation?
Dividing the network into multiple zones
60
SQL injection involves?
A database and a website