TEST Flashcards

1
Q

What name is given to a amateur hacker?
A Select one:
B blue team
C script kiddie
D black hat
E red hat

A

C script kiddie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is an example of an Internet data domain?
Select one:
A Cisco
B LinkedIn
C Palo Alto
D Juniper

A

B LinkedIn

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Thwarting cyber criminals includes which of the following? (Choose two.)
Select one or more:
A hiring hackers
B sharing cyber Intelligence information
C shutting down the network
D changing operating systems
E establishing early warning systems

A

B sharing cyber Intelligence information//
E establishing early warning systems//

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the workforce framework category that includes highly specialized review and evaluation of incoming cybersecurity information to determine if it is useful for intelligence?
Select one:
A Analyze
B Securely Provision
C Oversight and Development
D Protect and Defend

A

A Analyze//

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

.What type of an attack can disable a computer by forcing it to use memory or by overworking its CPU?
Select one:
A APT
B DDoS
C Exhaustion
D Algorithm

A

D Algorithm//

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What name is given to hackers who hack for a cause?
Select one:
A Hactivist
B blue hat
C hacker
D white hat

A

A Hactivist//

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What type of attack uses many systems to flood the resources of a target, thus making the target unavailable?
Select one:
A ping sweep
B DoS
C DDoS
D Spoof

A

C DDoS//

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does the term vulnerability mean?
Select one:
A a known target or victim machine
B a potential threat that a hacker creates
C a method of attack to exploit a target
D a weakness that makes a target susceptible to an attack
E a computer that contains sensitive information

A

D a weakness that makes a target susceptible to an attack//

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Pick three types of records that cyber criminals would be interested in stealing from organizations. (Choose three.)
Select one or more:
A Medical
B food
C rock
D flight
E game
F education
G employment

A

A Medical//

F education//
G employment//

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does the term BYOD represent?
Select one:
A bring your own device
B buy your own disaster
C bring your own decision
D bring your own disaster

A

A bring your own device//

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is a secure virtual network called that uses the public network?
Select one:
A IPS
B Firewall
C VPN
D NAC
E IDS
F MPLS

A

C VPN//

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which two methods help to ensure data integrity? (Choose two.)
Select one or more:
A data consistency checks
B privacy
C repudiation
D variability
E hashing
F authorization

A

A data consistency checks//

E hashing//

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What mechanism can organizations use to prevent accidental changes by authorized users?
Select one:
A hashing
B backups
C SHA-1
D encryption
E version control

A

E version control//

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

For the purpose of authentication, what three methods are used to verify identity? (Choose three.)
Select one or more
A something you are
B something you know
C something you have
E something you do
F where you are

A

A something you are//
B something you know//
C something you have//

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are the three foundational principles of the cybersecurity domain? (Choose three.)
Select one or more:
A Integrity
B security
C policy
E encryption
F availability
G confidentiality

A

A Integrity//

F availability//
G confidentiality//

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is identified by the first dimension of the cybersecurity cube?
Select one:
A knowledge
B tools
C goals
D rules
E safeguards

A

C goals//

17
Q

What are two common hash functions? (Choose two.)
Select one or more:
A SHA
B RSA
C Blowfish
D MD5
E RC4
F ECC

A

A SHA//

D MD5//

18
Q

What three design principles help to ensure high availability? (Choose three.)
Select one or more:
A use encryption
B detect failures as they occur
C check for data consistency
D eliminate single points of failure
E provide for reliable crossover
F ensure confidentiality

A

B detect failures as they occur//

D eliminate single points of failure//
E provide for reliable crossover//

19
Q

What type of cybersecurity laws protect you from an organization that might want to share your sensitive data?
Select one:
A authentication
B privacy
C integrity
D confidentiality
E nonrepudiation

A

B privacy//

20
Q

What are the three states of data? (Choose three.)
Select one or more:
A in-cloud
B encrypted
C suspended
D at rest
E in-process
F In-transit

A

D at rest//
E in-process//
F In-transit//

21
Q

What three tasks are accomplished by a comprehensive security policy? (Choose three.)
Select one or more:
A sets rules for expected behavior
B useful for management
C vagueness
D defines legal consequences of violations
E is not legally binding
F gives security staff the backing of management

A

A sets rules for expected behavior//

D defines legal consequences of violations//

F gives security staff the backing of management//

22
Q

22.What are three access control security services? (Choose three.)
Select one or more:
A access
B accounting
C authorization
D repudiation
E availability
F authentication

A

B accounting//
C authorization//

F authentication//

23
Q

What name is given to any changes to the original data such as users manually modifying data, programs processing and changing data, and equipment failures?
Select one:
A integrity
B backup
C dissemination
D modification
E corruption
F deletion

A

D modification//

24
Q

What service determines which resources a user can access along with the operations that a user can perform?
Select one:
A token
B accounting
C authorization
D biometric
E authentication

A

C authorization//

25
Q

What name is given to a storage device connected to a network?
Select one:
A RAID
B NAS
C Cloud
D DAS
E SAN

A

B NAS//

26
Q

What are three types of sensitive information? (Choose three.)
Select one or more:
A published
B PII
C public
D declassified
E classified
F business

A

B PII//
E classified//
F business//

27
Q

What are two methods that ensure confidentiality? (Choose two.)
Select one or more:
A Encryption
B integrity
C authorization
D nonrepudiation
E availability
F authentication

A

A Encryption//

F authentication//

28
Q

What three methods help to ensure system availability? (Choose three.)
Select one or more:
A system resiliency
B equipment maintenance
C up-to-date operating systems
D integrity checking
E fire extinguishers
F system backups

A

B equipment maintenance//
C up-to-date operating systems//
F system backups//

29
Q

What principle prevents the disclosure of information to unauthorized people, resources, and processes?
Select one:
A accounting
B integrity
C nonrepudiation
D confidentiality
F availability

A

D confidentiality//

30
Q

What is a method of sending information from one device to another using removable media?
Select one:
A infrared
B wired
C packet
D LAN
E sneaker net
F wireless

A

E sneaker net//