Which of the following security implementations use biometrics? (Choose two correct answers)
Fingerprint
Voice recognition
Pytanie 22
Which of the following firewalls filters traffic based on source and destination IP addresses?
Network layer firewall
Pytanie 23
Which of the following firewalls filters web content requests such as URLs and domain names?
Proxy server
Pytanie 24
A port scan returns a ‘dropped’ response. What does this mean?
There was no reply from the host
Pytanie 25
During a meeting with the Marketing department, a representative from IT discusses features of an upcoming product that will be released next year. Is this employee’s behavior ethical or unethical?
Ethical
Pytanie 26
Which of the following is an entry-level certification for newcomers who are preparing to start their career in cybersecurity?
‘Cybersecurity certifications are a way for you to verify your skills and knowledge and can also boost your career.’ Is this statement true or false?
True
Pytanie 28
When describing malware, what is a difference between a virus and a worm?
A virus replicates itself by attaching to another file, whereas a worm can replicate itself independently.
Pytanie 29
An employee is laid off after fifteen years with the same organization. The employee is then hired by another organization within a week. In the new organization, the employee shares documents and ideas for products that the employee proposed at the original organization. Is the employee’s behavior ethical or unethical?
Unethical
Pytanie 30
Which of the following firewalls filters traffic based on the user, device, role, application type and threat profile?
Context aware application firewall
Pytanie 31
What names are given to a database where all cryptocurrency transactions are recorded? (Select two correct answers)
Blockchain
Ledger
Pytanie 32
Which of the following items are states of data? (Choose three correct answers)
Storage
Transmission
Processing
Pytanie 33
‘Internet-based cameras and gaming gear are not subject to security breaches.’
Is this statement true or false?
False
Pytanie 34
What vulnerability occurs when data is written beyond the memory areas allocated to an application?
Buffer overflow
Pytanie 35
An organization’s IT department reports that their web server is receiving an abnormally high number of web page requests from different locations simultaneously. What type of security attack is occurring?
DDoS
Pytanie 36
Which of the following are commonly used port scanning applications? (Select two correct answers)
Zenmap
Nmap
Pytanie 37
What action will an IDS take upon detection of malicious traffic?
Create a network alert and log the detection
Pytanie 38
Which of the following statements best describes cybersecurity?
It is an ongoing effort to protect Internet-connected systems and the data associated with those systems from unauthorized use or harm
Pytanie 39
‘After a data breach, it’s important to educate employees, partners and customers on how to prevent future breaches.’ Is this statement true or false?
True
Pytanie 40
An employee points out a design flaw in a new product to the department manager. Is this employee’s behavior ethical or unethical?