Cybersecurity
Cybersecurity
--------------------------------------------------------------------
Ethical
--------------------------------------------------------------------
Which of the following firewalls filters ports and system service calls?
in a single computer operating system?
Host-based firewall
--------------------------------------------------------------------
After a data breach, it is important to educate employees, partners and
clients on how to prevent future violations.
True
--------------------------------------------------------------------
What is the best way to prevent spyware from being introduced into a machine?
Cryptojacking
--------------------------------------------------------------------
Which of the following are examples of in-route attacks?
Man-in-the-middle attack
Man-in-the-Mobile
--------------------------------------------------------------------
The cameras and the Internet-based gaming equipment are not subject to
security breaches.
False
--------------------------------------------------------------------
Which of the following security implementations use biometric data?
Scroll down and let's get started.
Voice recognition
Fingerprint
--------------------------------------------------------------------
Which of these is the most recognized and popular security certification, that
requires at least five years of relevant experience in the industry before
can I take the exam?
Open authorization
--------------------------------------------------------------------
What type of security vulnerability can be generated by inadequate management of the
physical access to a resource, such as a file?
True
--------------------------------------------------------------------
Which of the following firewalls hides or masks private addresses of
the hosts of the network?
Patient records
--------------------------------------------------------------------
What name is given to a group of bots connected through the Internet, with the
ability to be controlled by a malicious individual or group?
Botnet
--------------------------------------------------------------------
You are configuring the access settings to require employees to
organization that authenticates first before accessing certain web pages.
Confidentiality
--------------------------------------------------------------------
An organization is experiencing overwhelming visits to a web server.
principal. He is developing a plan to add a couple of additional web servers.
for load balancing and redundancy.
Availability
--------------------------------------------------------------------
Why would a network administrator use the Nmap tool?
Storage
Processing
Transmission
--------------------------------------------------------------------
One of her colleagues has lost her identification badge. She is in a hurry to
to attend a meeting and does not have time to go to Human Resources to obtain a
temporary credential. You lend your identification credential until
get a replacement.
Cryptocurrency
-------------------------------------------------
The process of an organization to identify and evaluate risk with the aim
Reducing these threats to an acceptable level is known as what?
Risk management
---------------------------------
Cryptocurrencies are handled on a centralized exchange.
False
---------------------------------------
"A botnet can have tens of thousands of bots, or even hundreds of thousands."
True
---------------------------------------------
Which of the following statements describes cyber warfare?
Buffer overflow
-------------------------------------------
What is the purpose of a backdoor?
Ethical
-------------------------------------------
An employee reports a design flaw in a new product to the manager of the
department.
Ethical
-------------------------------------------
Which of the following firewalls filters content requests?
web, like URLs and domain names?
Proxy server
-------------------------------------------
What type of attack interrupts services by overwhelming network devices with
fake traffic?
DDoS
-------------------------------------------
The advanced persistent threat (APT) is often well-funded.
True
-------------------------------------------
Which of the following certifications is aimed at high school students?
from early university, as well as anyone interested in a change of
profession?
DDoS
-------------------------------------------
If developers try to create their own security algorithms, what
What kind of vulnerabilities are likely to be introduced?
False
-------------------------------------------
What is the main function of the security incident response team?
Cisco?
To ensure the preservation of the company, the system, and the data
-------------------------------------------
Which of the following firewalls filters traffic based on addresses?
Source and destination IP?
Place all IoT devices that have internet access in an isolated network.
-------------------------------------------
The data entering a program must be sanitized, as they may contain
malicious content designed to force the program to behave in a certain way
undesired.
Unvalidated entry
-------------------------------------------
Which of the following firewalls filters traffic based on data ports?
origin and destination and the filtering according to the states of connection?
Race conditions
-------------------------------------------
What names are given to a database where all transactions are recorded?
of cryptocurrencies?
Register
-------------------------------------------
What names are given to a database where all transactions are recorded?
of cryptocurrencies?
Block chain
Record
-------------------------------------------
Which of the following tools used for incident detection is
can be used to detect anomalous behaviors, sort and control the
traffic and detect infected hosts?
NetFlow
-------------------------------------------
-------------------------------------------
-------------------------------------------