0% found this document useful (0 votes)
36 views7 pages

Cybersecurity

The document presents several questions about cybersecurity concepts with multiple choice answers. It addresses topics such as data integrity objectives, cyber wars, ethics, types of attacks, security implementations, and certifications.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
36 views7 pages

Cybersecurity

The document presents several questions about cybersecurity concepts with multiple choice answers. It addresses topics such as data integrity objectives, cyber wars, ethics, types of attacks, security implementations, and certifications.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

What are the objectives of ensuring data integrity?

Choose two correct answers

The data is not modified during transit

The data is not modified by unauthorized entities.

--------------------------------------------------------------------

What is the main objective of cyber warfare?

To gain an advantage over the adversaries


--------------------------------------------------------------------
In a meeting with the Marketing Department, an IT representative discusses the
functions of a new product that will be launched next year.

Is this employee's behavior ethical or unethical?

Ethical
--------------------------------------------------------------------
Which of the following firewalls filters ports and system service calls?
in a single computer operating system?

Host-based firewall

--------------------------------------------------------------------
After a data breach, it is important to educate employees, partners and
clients on how to prevent future violations.

Is this statement true or false?

True
--------------------------------------------------------------------
What is the best way to prevent spyware from being introduced into a machine?

Install software only from trusted websites


--------------------------------------------------------------------
What name is given to the emerging threat that hides in a computer or
mobile device and uses the resources of that machine to mine cryptocurrencies?

Cryptojacking
--------------------------------------------------------------------
Which of the following are examples of in-route attacks?

Scroll down and let's get started.

Man-in-the-middle attack

Man-in-the-Mobile
--------------------------------------------------------------------
The cameras and the Internet-based gaming equipment are not subject to
security breaches.

Is this statement true or false?

False
--------------------------------------------------------------------
Which of the following security implementations use biometric data?
Scroll down and let's get started.

Voice recognition

Fingerprint
--------------------------------------------------------------------
Which of these is the most recognized and popular security certification, that
requires at least five years of relevant experience in the industry before
can I take the exam?

ISC2 Certified Information Systems Security Professional


--------------------------------------------------------------------
A port scan returns an 'open' response. What does this mean?

A service is listening on the port.


--------------------------------------------------------------------
What technology creates a security token that allows a user to log in?
in a desired web application using credentials from a social network?

Open authorization
--------------------------------------------------------------------
What type of security vulnerability can be generated by inadequate management of the
physical access to a resource, such as a file?

Access control issues


--------------------------------------------------------------------
Cybersecurity certifications are a way to verify your skills and
knowledge and can also boost your career.

Is this statement true or false?

True
--------------------------------------------------------------------
Which of the following firewalls hides or masks private addresses of
the hosts of the network?

Network Address Translation Firewall


--------------------------------------------------------------------
What is the best way to prevent spyware from being introduced into a machine?

Install software only from trusted websites


--------------------------------------------------------------------
An employee of the medical office sends emails to patients about
your recent visits to the center.

What information would put patient privacy at risk if it were included?


in the email?

Patient records
--------------------------------------------------------------------
What name is given to a group of bots connected through the Internet, with the
ability to be controlled by a malicious individual or group?

Botnet
--------------------------------------------------------------------
You are configuring the access settings to require employees to
organization that authenticates first before accessing certain web pages.

What information security requirement is addressed through this


configuration?

Confidentiality
--------------------------------------------------------------------
An organization is experiencing overwhelming visits to a web server.
principal. He is developing a plan to add a couple of additional web servers.
for load balancing and redundancy.

What information security requirement is addressed in the implementation of the plan?

Availability
--------------------------------------------------------------------
Why would a network administrator use the Nmap tool?

To detect and identify open ports


--------------------------------------------------------------------
What measures will an IDS take upon detecting malicious traffic?

Create a network alert and log the detection


--------------------------------------------------------------------
You are browsing the Internet with a laptop in a public café with Wi-
What should you check first before connecting to the public network?

If the laptop requires user authentication to share


files and media
--------------------------------------------------------------------
Which of the following are examples of how to decrypt an encrypted password?

Choose four correct answers

Brute force attack


--------------------------------------------------------------------
Which of the following elements are data states?

Choose three correct answers

Storage

Processing

Transmission
--------------------------------------------------------------------
One of her colleagues has lost her identification badge. She is in a hurry to
to attend a meeting and does not have time to go to Human Resources to obtain a
temporary credential. You lend your identification credential until
get a replacement.

Is this behavior ethical or unethical?

Not very ethical


--------------------------------------------------------------------
An employee is at a restaurant with friends and tells them about a new and
exciting video game that is being developed in the organization for which
they work.

Is this employee's behavior ethical or unethical?


Not very ethical
--------------------------------------------------------------------
What is the name of a digital asset designed to function as a medium of
exchange that uses strong encryption to protect a financial transaction?

Cryptocurrency
-------------------------------------------------
The process of an organization to identify and evaluate risk with the aim
Reducing these threats to an acceptable level is known as what?

Risk management
---------------------------------
Cryptocurrencies are handled on a centralized exchange.

Is this statement true or false?

False
---------------------------------------
"A botnet can have tens of thousands of bots, or even hundreds of thousands."

Is this statement true or false?

True
---------------------------------------------
Which of the following statements describes cyber warfare?

It is an ongoing effort to protect systems connected to the Internet and the


data associated with those systems of unauthorized use or damage
What
vulnerability occurs when data is written beyond memory areas
assigned to an application?

Buffer overflow
-------------------------------------------
What is the purpose of a backdoor?

To gain unauthorized access to a system without authentication procedures


normals
-------------------------------------------------------------------------
What is often referred to with the execution of an advanced operation,
stealthy, with several phases and long-term against a specific target?

Advanced Persistent Threat


-------------------------------------------
Which of the following firewalls filters traffic based on the user,
device, the role, the type of application and the threat profile?

Context-sensitive application firewall


-------------------------------------------
In a meeting with the Marketing Department, an IT representative discusses the
functions of a new product that will be launched next year.

Is this employee's behavior ethical or unethical?

Ethical
-------------------------------------------
An employee reports a design flaw in a new product to the manager of the
department.

Is this employee's behavior ethical or unethical?

Ethical
-------------------------------------------
Which of the following firewalls filters content requests?
web, like URLs and domain names?

Proxy server
-------------------------------------------
What type of attack interrupts services by overwhelming network devices with
fake traffic?

DDoS
-------------------------------------------
The advanced persistent threat (APT) is often well-funded.

Is this statement true or false?

True
-------------------------------------------
Which of the following certifications is aimed at high school students?
from early university, as well as anyone interested in a change of
profession?

Microsoft Technology Associate Security Fundamentals


-------------------------------------------
Which of the following certifications does not expire or require recertification?
periodic and is aimed at post-secondary graduates and those interested in
a career change?

ISACA CSX Cybersecurity Fundamentals


-------------------------------------------
Which of the following firewalls hides or masks private addresses of
the hosts of the network?

Network Address Translation Firewall


-------------------------------------------
What kind of attack do zombies use?

DDoS
-------------------------------------------
If developers try to create their own security algorithms, what
What kind of vulnerabilities are likely to be introduced?

Weakness in Security Practices


-------------------------------------------
A data breach does not affect the reputation of an organization.

Is this statement true or false?

False
-------------------------------------------
What is the main function of the security incident response team?
Cisco?
To ensure the preservation of the company, the system, and the data
-------------------------------------------
Which of the following firewalls filters traffic based on addresses?
Source and destination IP?

Network layer firewall


-------------------------------------------
What is the best approach to prevent a compromised IoT device from accessing
maliciously to data and devices on a local network?

Place all IoT devices that have internet access in an isolated network.
-------------------------------------------
The data entering a program must be sanitized, as they may contain
malicious content designed to force the program to behave in a certain way
undesired.

Does this statement describe what security vulnerability?

Unvalidated entry
-------------------------------------------
Which of the following firewalls filters traffic based on data ports?
origin and destination and the filtering according to the states of connection?

Transport layer firewall


-------------------------------------------
What vulnerability occurs when the output of an event depends on outputs
ordered or timed?

Race conditions
-------------------------------------------
What names are given to a database where all transactions are recorded?
of cryptocurrencies?

Select two correct answers

Register
-------------------------------------------
What names are given to a database where all transactions are recorded?
of cryptocurrencies?

Select two correct answers

Block chain

Record
-------------------------------------------
Which of the following tools used for incident detection is
can be used to detect anomalous behaviors, sort and control the
traffic and detect infected hosts?

Scroll down and let's get started.

Intrusion detection system

NetFlow
-------------------------------------------

-------------------------------------------
-------------------------------------------

You might also like