CyberSecurity Final Exam
CyberSecurity Final Exam
What is the best approach to prevent a compromised IoT device from maliciously
accessing data and devices on a local network?
Place all IoT devices that have access to the Internet on an isolated network.
Which technology creates a security tooken that allows a user to log in to a desired web
application using credentials from a social media website?
Open Authorization
A medical office employee sends emails to patients about recent patient visits to the
facility. What information would put the privacy of the patients at risk if it was included in
the email?
Patient Records
Which two tools used for incident detection can be used to detect anomalous behavior,
to detect command and control traffic, and to detect infected hosts?
1) Netflow. 2)IDS
For what purpose would a network administrator use the Nmap tool?
Detection and Identification of open ports
Which stage of the kill chain used by attackers focuses on the identification and
selection of targets?
Reconnaissance
What tool is used to lure an attacker so that an administrator can capture, log, and
analyze the behavior of the attack?
Honeypot
What is the main function of the Cisco Security Incident Response Team?
To ensure company, system, and data preservation