Twój wynik: BSS - ItC (en)

Twój wynik

Rozwiąż ponownie
Moja historia
Powtórka: Wybierz pytania
Pytanie 1
Which of the following firewalls hides or masquerades the private addresses of network hosts?
Proxy server
Network layer firewall
Host-based firewall
Network address translation firewall
Reverse proxy firewall
Pytanie 2
Carrying out a multi-phase, long-term, stealthy and advanced operation against a specific target is often referred to as what?
Script kiddies
Advanced persistent threat
Network sniffing
Rainbow tables
Social engineering
Pytanie 3
You are configuring access settings to require employees in your organization to authenticate first before accessing certain web pages. Which requirement of information security is addressed through this configuration?
Confidentiality
Scalability
Integrity
Availability
Pytanie 4
What are the objectives of ensuring data integrity? (Choose two correct answers)
Access to the data is authenticated
Data is not changed by unauthorized entities
Data is unaltered during transit
Data is available all the time
Data is encrypted while in transit and when stored on disks
Pytanie 5
An organization is experiencing overwhelming visits to a main web server. You are developing a plan to add a couple of more web servers for load balancing and redundancy. Which requirement of information security is addressed by implementing the plan?
Scalability
Integrity
Availability
Confidentiality
Pytanie 6
What of the following are examples of cracking an encrypted password? (Choose four correct answers)
Dictionary attack
Spraying
Rainbow tables
Network sniffing
Intimidation
Social engineering
Brute force attack
Pytanie 7
Improper management of physical access to a resource, such as a file, can lead to what type of security vulnerability?
Non-validated input
Buffer overflow
Race conditions
Weaknesses in security practices
Access control problems
Pytanie 8
A medical office employee sends emails to patients about their recent visits to the facility. What information would put the privacy of the patients at risk if it was included in the email?
Patient records
Next appointment
First and last name
Contact information
Pytanie 9
What is the best way to avoid getting spyware on a machine?
Install software only from trusted websites
Install the latest web browser updates
Install the latest operating system updates
Install the latest antivirus updates
Pytanie 10
You are surfing the Internet using a laptop at a public Wi-Fi cafe. What should you check first before you connect to the public network?
That the Bluetooth adapter is disabled
That the laptop web browser is operating in private mode
If the laptop requires user authentication for file and media sharing
If the laptop has a master password set to secure the passwords stored in the password manager
Pytanie 11
What is the main function of the Cisco Security Incident Response Team?
To provide standards for new encryption techniques
To design polymorphic malware
To ensure company, system and data preservation
To design next generation routers and switches that are less prone to cyber attacks
Pytanie 12
Which of the following firewalls are placed in front of web services to protect, hide, offload and distribute access to web servers?
Transport layer firewall
Proxy server
Network layer firewall
Reverse proxy server
Application layer firewall
Pytanie 13
Which of the following certifications meets the U.S. Department of Defense Directive 8570.01-M requirements, which is important for anyone looking to work in IT security for the federal government?
Microsoft Technology Associate Security Fundamentals
ISC2 Certified Information Systems Security Professional
CompTIA Security+
ISACA CSX Cybersecurity Fundamentals
EC Council Certified Ethical Hacker
Palo Alto Networks Certified Cybersecurity Associate
Pytanie 14
One of your colleagues has lost her identification badge. She is in a hurry to get to a meeting and does not have time to visit Human Resources to get a temporary badge. You lend her your identification badge until she can obtain a replacement. Is this behavior ethical or unethical?
Ethical
Unethical
Pytanie 15
Which of the following certifications tests your understanding and knowledge in how to look for weaknesses and vulnerabilities in target systems using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner?
CompTIA Security+
EC Council Certified Ethical Hacker
Microsoft Technology Associate Security Fundamentals
ISC2 Certified Information Systems Security Professional
Palo Alto Networks Certified Cybersecurity Associate
ISACA CSX Cybersecurity Fundamentals
Pytanie 16
What is the main purpose of cyberwarfare?
To gain advantage over adversaries
To develop advanced network devices
To protect cloud-based data centers
To simulate possible war scenarios among nations
Pytanie 17
What vulnerability occurs when the output of an event depends on ordered or timed outputs?
Race conditions
Buffer overflow
Non-validated input
Weaknesses in security practices
Access control problems
Pytanie 18
What do you call the vulnerabilities discovered by Google security researchers that affect almost all CPUs released since 1995? (Select two correct answers)
NotPetva
Shell shock
WannaCry
Meltdown
Spectre
Pytanie 19
If developers attempt to create their own security algorithms, it will likely introduce what type of vulnerabilities?
Non-validated input
Weaknesses in security practices
Buffer overflow
Race conditions
Access control problems
Pytanie 20
Which technology creates a security token that allows a user to log in to a desired web application using credentials from a social media website?
Password manager
VPN service
In-private browsing mode3
Open authorization
Pytanie 21
Which of the following security implementations use biometrics? (Choose two correct answers)
Fingerprint
Fob
Credit card
Voice recognition
Phone
Pytanie 22
Which of the following firewalls filters traffic based on source and destination IP addresses?
Proxy server
Network address translation firewall
Network layer firewall
Transport layer firewall
Application layer firewall
Pytanie 23
Which of the following firewalls filters web content requests such as URLs and domain names?
Proxy server
Reverse proxy server
Network layer firewall
Application layer firewall
Network address translation firewall
Pytanie 24
A port scan returns a ‘dropped’ response. What does this mean?
Connections to the port will be denied
There was no reply from the host
A service is listening on the port
Pytanie 25
During a meeting with the Marketing department, a representative from IT discusses features of an upcoming product that will be released next year. Is this employee’s behavior ethical or unethical?
Ethical
Unethical
Pytanie 26
Which of the following is an entry-level certification for newcomers who are preparing to start their career in cybersecurity?
EC Council Certified Ethical Hacker
Palo Alto Networks Certified Cybersecurity Associate
ISC2 Certified Information Systems Security Professional
CompTIA Security+
ISACA CSX Cybersecurity Fundamentals
Microsoft Technology Associate Security Fundamentals
Pytanie 27
‘Cybersecurity certifications are a way for you to verify your skills and knowledge and can also boost your career.’ Is this statement true or false?
False
True
Pytanie 28
When describing malware, what is a difference between a virus and a worm?
A virus can be used to launch a DoS attack (but not a DDoS), but a worm can be used to launch both DoS and DDoS attacks.
A virus can be used to deliver advertisements without user consent, whereas a worm cannot.
A virus replicates itself by attaching to another file, whereas a worm can replicate itself independently.
A virus focuses on gaining privileged access to a device, whereas a worm does not.
Pytanie 29
An employee is laid off after fifteen years with the same organization. The employee is then hired by another organization within a week. In the new organization, the employee shares documents and ideas for products that the employee proposed at the original organization. Is the employee’s behavior ethical or unethical?
Ethical
Unethical
Pytanie 30
Which of the following firewalls filters traffic based on the user, device, role, application type and threat profile?
Host-based firewall
Network layer firewall
Network address translation firewall
Context aware application firewall
Application layer firewall
Pytanie 31
What names are given to a database where all cryptocurrency transactions are recorded? (Select two correct answers)
Ledger
Table
Blockchain
Spreadsheet
Pytanie 32
Which of the following items are states of data? (Choose three correct answers)
Text
Processing
Transmission
Binary
Storage
ASCII
Pytanie 33
‘Internet-based cameras and gaming gear are not subject to security breaches.’ Is this statement true or false?
True
False
Pytanie 34
What vulnerability occurs when data is written beyond the memory areas allocated to an application?
Race conditions
Buffer overflow
Weaknesses in security practices
Access control problems
Non-validated input
Pytanie 35
An organization’s IT department reports that their web server is receiving an abnormally high number of web page requests from different locations simultaneously. What type of security attack is occurring?
DDoS
Social engineering
Phishing
Spyware
Adware
Pytanie 36
Which of the following are commonly used port scanning applications? (Select two correct answers)
Sequence number
Port number
Nmap
Zenmap
Pytanie 37
What action will an IDS take upon detection of malicious traffic?
Reroute malicious traffic to a honeypot
Drop only packets identified as malicious
Block or deny all traffic
Create a network alert and log the detection
Pytanie 38
Which of the following statements best describes cybersecurity?
It is a standard-based model for developing firewall technologies to fight against cybercrime
It is a framework for security policy development
It is the name of a comprehensive security application for end users to protect workstations from being attacked
It is an ongoing effort to protect Internet-connected systems and the data associated with those systems from unauthorized use or harm
Pytanie 39
‘After a data breach, it’s important to educate employees, partners and customers on how to prevent future breaches.’ Is this statement true or false?
True
False
Pytanie 40
An employee points out a design flaw in a new product to the department manager. Is this employee’s behavior ethical or unethical?
Unethical
Ethical
Pytanie 41
‘Data coming into a program should be sanitized, as it could have malicious content, designed to force the program to behave in an unintended way.’ This statement describes what security vulnerability?
Buffer overflow
Non-validated input
Weaknesses in security practices
Access control problems
Race conditions
Pytanie 42
Which of the following are examples of on-path attacks? (Choose two correct answers)
SEO poisoning
DDoS
Ransomware
Man-in-the-Middle
Worms
Man-in-the-Mobile
Pytanie 43
Which of the following firewalls filters traffic based on application, program or service?
Network layer firewall
Context aware application firewall
Host-based firewall
Proxy server
Application layer firewall
Pytanie 44
A port scan returns a ‘closed’ response. What does this mean?
Connections to the port will be denied
There was no reply from the host
A service is listening on the port
Pytanie 45
'Cryptocurrency transactions are digital.’ Is this statement true or false?
True
False
Pytanie 46
What do you call a digital asset designed to work as a medium of exchange that uses strong encryption to secure a financial transaction?
Google Pay
Apple Pay
Cryptocurrency
Near Field Communications
Pytanie 47
Which of the following tools used for incident detection can be used to detect anomalous behavior, command and control traffic, and detect infected hosts? (Choose two correct answers)
Nmap
NetFlow
Honeypot
Reverse proxy server
Intrusion detection system
Pytanie 48
What name is given to a group of bots, connected through the Internet, with the ability to be controlled by a malicious individual or group?
Hacker network
Zombie
Botnet
Crime syndicate
Pytanie 49
What is the best approach for preventing a compromised IoT device from maliciously accessing data and devices on a local network?
Install a software firewall on every network device
Disconnect all IoT devices from the Internet
Set the security settings of workstation web browsers to a higher level
Place all IoT devices that have access to the Internet on an isolated network
Pytanie 50
What name is given to the emerging threat that hides on a computer or mobile device and uses that machine’s resources to mine cryptocurrencies?
Cryptoransomware
Bluejacking
Phishing
Cryptojacking
Pytanie 51
A port scan returns an ‘open’ response. What does this mean?
Connections to the port will be denied
A service is listening on the port
There was no reply from the host
Pytanie 52
An employee is at a restaurant with friends and tells them about an exciting new video game that is under development at the organization they work for. Is this employee’s behavior ethical or unethical?
Ethical
Unethical
Pytanie 53
‘An advanced persistent threat (APT) is usually well funded.’ Is this statement true or false?
True
False
Pytanie 54
In networking, what name is given to the identifier at both ends of a transmission to ensure that the right data is passed to the correct application?
MAC address
IP address
Port number
Sequence number
Pytanie 55
‘An employee does something as an organization representative with the knowledge of that organization and this action is deemed illegal. The organization is legally responsible for this action.’ Is this statement true or false?
True
False
Pytanie 56
What tool is used to lure an attacker so that an administrator can capture, log and analyze the behavior of the attack?
NetFlow
Honeypot
Nmap
IDS
Pytanie 57
‘A data breach does not impact the reputation of an organization.’ Is this statement true or false?
True
False
Pytanie 58
Which of the following certifications is aimed at high school and early college students, as well as anyone interested in a career change?
Microsoft Technology Associate Security Fundamentals
CompTIA Security+
EC Council Certified Ethical Hacker
ISC2 Certified Information Systems Security Professional
Palo Alto Networks Certified Cybersecurity Associate
ISACA CSX Cybersecurity Fundamentals
Pytanie 59
Which of the following firewalls filters traffic based on source and destination data ports and filtering based on connection states?
Host-based firewall
Network layer firewall
Transport layer firewall
Network address translation firewall
Application layer firewall
Pytanie 60
Which of the following are categories of security measures or controls? (Choose three correct answers)
Camera
Guards
Technology
Firewalls
Policy and procedure
Awareness, training and education
Pytanie 61
‘A botnet can have tens of thousands of bots, or even hundreds of thousands.’ Is this statement true or false?
True
False
Pytanie 62
For what purpose would a network administrator use the Nmap tool?
To identify specific network anomalies
To protect the private IP addresses of internal hosts
To collect and analyze security alerts and logs
To detect and identify open ports
Pytanie 63
Which of the following certifications does not expire or require periodic recertification and is geared towards post-secondary graduates and those interested in a career change?
ISC2 Certified Information Systems Security Professional
ISACA CSX Cybersecurity Fundamentals
CompTIA Security+
Microsoft Technology Associate Security Fundamentals
Palo Alto Networks Certified Cybersecurity Associate
EC Council Certified Ethical Hacker
Pytanie 64
What type of attack uses zombies?
Trojan horse
Spear phishing
DDoS
SEO poisoning
Pytanie 65
What is the purpose of a backdoor?
To enable software vendors to update software
To allow developers to debug software
To gain unauthorized access to a system without normal authentication procedures
For government access
Pytanie 66
Which of the following firewalls filters ports and system service calls on a single computer operating system?
Network layer firewall
Host-based firewall
Transport layer firewall
Application layer firewall
Network address translation firewall
Pytanie 67
What type of attack disrupts services by overwhelming network devices with bogus traffic?
Zero-day
Brute force
DDoS
Port scans
Pytanie 68
‘Cryptocurrencies are handled on a centralized exchange.’ Is this statement true or false?
False
True
Pytanie 69
Several @Apollo employees have reported that the network access is slow. After investigation, the network administrator has learned that one employee downloaded a third-party scanning program for the printer. What type of malware might have been introduced that is causing slow performance of the network?
Spam
Worm
Virus
Phishing
Pytanie 70
What is an example of cyber kill chain?
a planned process of cyber attack
Pytanie 71
An organization’s process of identifying and assessing risk with the goal of reducing these threats to an acceptable level is known as what?
Risk management
Vulnerability scanning
Business continuity
Disaster recovery
Pytanie 72
An employee is laid off after fifteen years with the same organization. The employee is then hired by another organization within a week. In the new organization, the employee shares documents and ideas for products that the employee proposed at the original organization. Is the employee’s behavior ethical or unethical?
Ethical
Unethical