Cybersecurity Course Quiz With Answers
Cybersecurity Course Quiz With Answers
1. The most appropriate definition of Cyberspace is: 6. Crime activities on Cyberspace are monitored by:
a) The origin of Cyber Attacks a) Local Government
b) A virtual place for virtual applications b) FBI and Interpol
c) A virtual place for virtual applications used by virtual c) Nobody
people
d) Darknet
d) None of the above
Answer: b
Answer: c
7. Identify risk sources on Cyberspace:
2. The role of the standard ISO 27032 may be described as:
a) People
a) A tool for the definition of a cybersecurity strategy and b) Virtual devices and avatars
management
c) Offices
b) Guideline for cybersecurity choice of security controls
d) Darknet
c) A valid alternative for the identification of
cybersecurity risk sources Answer: d
d) All of the above 8. What is the most effective technique to manage access
control in Cyberspace?
Answer: d
3. The integration between NIST and ISO 27032 may be a) Not allow access at all
demonstrated by: b) The use of local signon
a) The use of the same terminology c) The use of single signon
b) Both standards describe a framework for cybersecurity d) Use of encryption
implementation Answer: c
c) The security controls objectives are similar. 9. Select which will the most effective technique to ensure
d) They have the same number of procedures to be non-repudiation on networks:
implemented
a) The use of IPSec
Answer: b
b) The use of redundant devices
4. What are the objectives of protection on Cyberspace
c) The use of encryption
according to ISO 27032?
d) The use of digital signatures
a) Protection of information and data
Answer: d
b) Protection of databases and related applications
10. The security control A.14.2.7 — Outsourced
c) Protection of privacy data development security May be implemented by:
d) Protection of confidentiality, integrity and availability.
a) Using a CCMi framework
Answer: d
b) Using a Scrum framework
5. What must be the priorities of asset protection in
c) Implementing ISO 27001 policies, processes and
Cyberspace?
procedures
a) Applications, communications and data d) Implementing ISO 27034
b) Applications, data and software development Answer: d
c) Applications, communication, access control and 11. Data breach is an attack vector that can use:
people
a) An SQL injection technique
d) Applications, communication, access control
b) A physical theft of information
Answer: c
c) Broken passwords
d) All of the above
Answer: d
CYBERSECURITY COURSE QUIZ
12. How do you respond to a Cyber Attack from the 17. A Bluedump is a typical attack that intends:
Darknet?
a) Data dump and breach
a) Don't attempt to do it b) Bluetooth PIN reversing
b) Using some attack techniques c) Botnet zombie control
c) Using a Darknet collector d) None of the above
d) Using outrsourced services y. Answer: b
Answer: a
13. Possible technics for the Web Applications attack 18. A Darknet Collector is:
vector are:
a) A segregated network for traffic analysis
a) SQL Injection
b) A log of attack vectors details
b) PHP Injection
c) An analysis tool for cyber attacks
c) Cross Site Scripting
d) All of the above
d) All of the above
Answer: d
Answer: d
19. The best alternative to describe a Sinkhole may be:
14. A spam attack vector will be identified as having origin
on a botnet if: a) A segregated network for traffic analysis
a) Several different portable devices are being used for b) A technic that divert attack traffic for a specific IP
the attack. address
b) It was traced back to the darknet c) A tools for implementing a sand box
c) Logs of untheorized chances are being detected d) A way to identify possible attacks
d) None of the above Answer: b
Answer: a 20. What will the best stage to protect an organization for
a phishing attack, using the "kill chain" methodology":
15. What is the meaning of anAPDosalternative for a
Denial of Service attack? a) Reconnaissance, weaponization or delivery
a) A combination of a massive DDos using multiple b) Command and Control
communications layers c) Delivery
b) Advanced Persistent DDoS d) Exploitation
c) A combination of repeated application layer attacks Answer:a
(SQLi and XSS)
d) All of the above
Answer: b
16. Please select the most appropriated assets to be found
in Cyberspace:
a) Virtual Money
b) Attackers
c) Police enforcement
d) Datacenters
Answer: d