0% found this document useful (0 votes)
747 views2 pages

CyberSecurity Final Exam

Cyber security unites Cisco examination certification

Uploaded by

iammrdontee
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
747 views2 pages

CyberSecurity Final Exam

Cyber security unites Cisco examination certification

Uploaded by

iammrdontee
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

Which statement describes cybersecurity?

Cybersecurity is the body of technologies,processes and practices designed to protect


networks,computers,programs and data from attack,damage, or unauthorized access.

What are two objectives of ensuring data integrity?


1) Data is not changed by unauthorized entities. 2) Data is unaltered during transit.

A web server administrator is configuring access settings to require users to


authenticate first before accessing certain web pages. Which requirement of information
security is addressed through the configuration?
Confidentiality

A company is experiencing overwhelming visits to a main web server. The IT


department is developing a plan to add a couple more web servers for load balancing
and redundancy. Which requirement of information security is addressed by
implementing the plan?
Availability

True or False? An employee does something as a company representative with the


knowledge of that company and this action is deemed illegal. The company would be
legally responsible for this action.
True

What is the main purpose of cyberwarfare?


To gain advantage over adversaries

When describing malware, what is a difference between a virus and a worm?


A virus replicates itself by attaching to another file whereas a worm can replicate itself
independently.

What type of attack uses zombies?


DDOS

The IT department is reporting that a company web server is receiving an abnormally


high number of web page request from different locations simultaneously. Which type of
security attack is occurring?
DDOS

What is the best approach to prevent a compromised IoT device from maliciously
accessing data and devices on a local network?
Place all IoT devices that have access to the Internet on an isolated network.

What is the best method to avoid getting spyware on a machine?


Install software only from trusted websites
What are two security implementations that use biometrics?
1) Finger Print. 2) Voice Recongition

Which technology creates a security tooken that allows a user to log in to a desired web
application using credentials from a social media website?
Open Authorization

A medical office employee sends emails to patients about recent patient visits to the
facility. What information would put the privacy of the patients at risk if it was included in
the email?
Patient Records

Which two tools used for incident detection can be used to detect anomalous behavior,
to detect command and control traffic, and to detect infected hosts?
1) Netflow. 2)IDS

For what purpose would a network administrator use the Nmap tool?
Detection and Identification of open ports

Which stage of the kill chain used by attackers focuses on the identification and
selection of targets?
Reconnaissance

What is an example of the Cyber Kill Chain?


Planned process of a cyber attack

What tool is used to lure an attacker so that an administrator can capture, log, and
analyze the behavior of the attack?
Honeypot

What is the main function of the Cisco Security Incident Response Team?
To ensure company, system, and data preservation

What action will an IDS take upon detection of malicious traffic?


Create a network alert and log the detection. An IDS , or intrusion detection system is a
device that can scan packets and compare them to a set of rules or attack signatures. If
the packets match attack signatures, then the IDS can create an alert and log the
detection.

You might also like