Strona 4

BSS - ItC (en)

Przejdź na Memorizer+
W trybie testu zyskasz:
Brak reklam
Quiz powtórkowy - pozwoli Ci opanować pytania, których nie umiesz
Więcej pytań na stronie testu
Wybór pytań do ponownego rozwiązania
Trzy razy bardziej pojemną historię aktywności
Wykup dostęp
Pytanie 25
During a meeting with the Marketing department, a representative from IT discusses features of an upcoming product that will be released next year. Is this employee’s behavior ethical or unethical?
Unethical
Ethical
Pytanie 26
Which of the following is an entry-level certification for newcomers who are preparing to start their career in cybersecurity?
Palo Alto Networks Certified Cybersecurity Associate
ISACA CSX Cybersecurity Fundamentals
ISC2 Certified Information Systems Security Professional
CompTIA Security+
Microsoft Technology Associate Security Fundamentals
EC Council Certified Ethical Hacker
Pytanie 27
‘Cybersecurity certifications are a way for you to verify your skills and knowledge and can also boost your career.’ Is this statement true or false?
False
True
Pytanie 28
When describing malware, what is a difference between a virus and a worm?
A virus can be used to launch a DoS attack (but not a DDoS), but a worm can be used to launch both DoS and DDoS attacks.
A virus focuses on gaining privileged access to a device, whereas a worm does not.
A virus replicates itself by attaching to another file, whereas a worm can replicate itself independently.
A virus can be used to deliver advertisements without user consent, whereas a worm cannot.
Pytanie 29
An employee is laid off after fifteen years with the same organization. The employee is then hired by another organization within a week. In the new organization, the employee shares documents and ideas for products that the employee proposed at the original organization. Is the employee’s behavior ethical or unethical?
Ethical
Unethical
Pytanie 30
Which of the following firewalls filters traffic based on the user, device, role, application type and threat profile?
Network address translation firewall
Context aware application firewall
Host-based firewall
Application layer firewall
Network layer firewall
Pytanie 31
What names are given to a database where all cryptocurrency transactions are recorded? (Select two correct answers)
Blockchain
Table
Spreadsheet
Ledger
Pytanie 32
Which of the following items are states of data? (Choose three correct answers)
Storage
Transmission
Processing
Text
Binary
ASCII