Strona 2

BSS - ItC (en)

Przejdź na Memorizer+
W trybie testu zyskasz:
Brak reklam
Quiz powtórkowy - pozwoli Ci opanować pytania, których nie umiesz
Więcej pytań na stronie testu
Wybór pytań do ponownego rozwiązania
Trzy razy bardziej pojemną historię aktywności
Wykup dostęp
Pytanie 9
What is the best way to avoid getting spyware on a machine?
Install the latest operating system updates
Install the latest web browser updates
Install the latest antivirus updates
Install software only from trusted websites
Pytanie 10
You are surfing the Internet using a laptop at a public Wi-Fi cafe. What should you check first before you connect to the public network?
If the laptop has a master password set to secure the passwords stored in the password manager
That the laptop web browser is operating in private mode
If the laptop requires user authentication for file and media sharing
That the Bluetooth adapter is disabled
Pytanie 11
What is the main function of the Cisco Security Incident Response Team?
To design polymorphic malware
To provide standards for new encryption techniques
To design next generation routers and switches that are less prone to cyber attacks
To ensure company, system and data preservation
Pytanie 12
Which of the following firewalls are placed in front of web services to protect, hide, offload and distribute access to web servers?
Proxy server
Application layer firewall
Network layer firewall
Reverse proxy server
Transport layer firewall
Pytanie 13
Which of the following certifications meets the U.S. Department of Defense Directive 8570.01-M requirements, which is important for anyone looking to work in IT security for the federal government?
CompTIA Security+
Microsoft Technology Associate Security Fundamentals
EC Council Certified Ethical Hacker
Palo Alto Networks Certified Cybersecurity Associate
ISC2 Certified Information Systems Security Professional
ISACA CSX Cybersecurity Fundamentals
Pytanie 14
One of your colleagues has lost her identification badge. She is in a hurry to get to a meeting and does not have time to visit Human Resources to get a temporary badge. You lend her your identification badge until she can obtain a replacement. Is this behavior ethical or unethical?
Unethical
Ethical
Pytanie 15
Which of the following certifications tests your understanding and knowledge in how to look for weaknesses and vulnerabilities in target systems using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner?
Palo Alto Networks Certified Cybersecurity Associate
Microsoft Technology Associate Security Fundamentals
EC Council Certified Ethical Hacker
CompTIA Security+
ISC2 Certified Information Systems Security Professional
ISACA CSX Cybersecurity Fundamentals
Pytanie 16
What is the main purpose of cyberwarfare?
To simulate possible war scenarios among nations
To develop advanced network devices
To gain advantage over adversaries
To protect cloud-based data centers