Fiszki

BSS - ItC (en)

Test w formie fiszek
Ilość pytań: 72 Rozwiązywany: 331 razy
Which of the following security implementations use biometrics? (Choose two correct answers)
Fingerprint
Voice recognition
Fob
Credit card
Phone
Fingerprint
Voice recognition
Which of the following firewalls filters traffic based on source and destination IP addresses?
Proxy server
Application layer firewall
Network address translation firewall
Transport layer firewall
Network layer firewall
Network layer firewall
Which of the following firewalls filters web content requests such as URLs and domain names?
Application layer firewall
Proxy server
Network layer firewall
Reverse proxy server
Network address translation firewall
Proxy server
A port scan returns a ‘dropped’ response. What does this mean?
Connections to the port will be denied
There was no reply from the host
A service is listening on the port
There was no reply from the host
During a meeting with the Marketing department, a representative from IT discusses features of an upcoming product that will be released next year. Is this employee’s behavior ethical or unethical?
Ethical
Unethical
Ethical
Which of the following is an entry-level certification for newcomers who are preparing to start their career in cybersecurity?
CompTIA Security+
ISC2 Certified Information Systems Security Professional
Microsoft Technology Associate Security Fundamentals
ISACA CSX Cybersecurity Fundamentals
Palo Alto Networks Certified Cybersecurity Associate
EC Council Certified Ethical Hacker
Palo Alto Networks Certified Cybersecurity Associate
‘Cybersecurity certifications are a way for you to verify your skills and knowledge and can also boost your career.’ Is this statement true or false?
False
True
True
When describing malware, what is a difference between a virus and a worm?
A virus can be used to launch a DoS attack (but not a DDoS), but a worm can be used to launch both DoS and DDoS attacks.
A virus replicates itself by attaching to another file, whereas a worm can replicate itself independently.
A virus can be used to deliver advertisements without user consent, whereas a worm cannot.
A virus focuses on gaining privileged access to a device, whereas a worm does not.
A virus replicates itself by attaching to another file, whereas a worm can replicate itself independently.
An employee is laid off after fifteen years with the same organization. The employee is then hired by another organization within a week. In the new organization, the employee shares documents and ideas for products that the employee proposed at the original organization. Is the employee’s behavior ethical or unethical?
Unethical
Ethical
Unethical
Which of the following firewalls filters traffic based on the user, device, role, application type and threat profile?
Host-based firewall
Network layer firewall
Network address translation firewall
Application layer firewall
Context aware application firewall
Context aware application firewall
What names are given to a database where all cryptocurrency transactions are recorded? (Select two correct answers)
Spreadsheet
Table
Ledger
Blockchain
Ledger
Blockchain
Which of the following items are states of data? (Choose three correct answers)
Processing
Transmission
Storage
Text
ASCII
Binary
Processing
Transmission
Storage
‘Internet-based cameras and gaming gear are not subject to security breaches.’ Is this statement true or false?
True
False
False
What vulnerability occurs when data is written beyond the memory areas allocated to an application?
Non-validated input
Weaknesses in security practices
Buffer overflow
Access control problems
Race conditions
Buffer overflow
An organization’s IT department reports that their web server is receiving an abnormally high number of web page requests from different locations simultaneously. What type of security attack is occurring?
Spyware
Social engineering
DDoS
Adware
Phishing
DDoS
Which of the following are commonly used port scanning applications? (Select two correct answers)
Port number
Nmap
Zenmap
Sequence number
Nmap
Zenmap
What action will an IDS take upon detection of malicious traffic?
Drop only packets identified as malicious
Block or deny all traffic
Reroute malicious traffic to a honeypot
Create a network alert and log the detection
Create a network alert and log the detection
Which of the following statements best describes cybersecurity?
It is an ongoing effort to protect Internet-connected systems and the data associated with those systems from unauthorized use or harm
It is a framework for security policy development
It is the name of a comprehensive security application for end users to protect workstations from being attacked
It is a standard-based model for developing firewall technologies to fight against cybercrime
It is an ongoing effort to protect Internet-connected systems and the data associated with those systems from unauthorized use or harm
‘After a data breach, it’s important to educate employees, partners and customers on how to prevent future breaches.’ Is this statement true or false?
False
True
True
An employee points out a design flaw in a new product to the department manager. Is this employee’s behavior ethical or unethical?
Unethical
Ethical
Ethical

Powiązane tematy

Inne tryby