Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Intro Cyber Final

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 14

 1. Which statement best describes a motivation of hacktivists?

They are part of a protest group behind a political cause.

 2. Which type of cybercriminal is the most likely to create


malware to compromise an organization by stealing credit card
information?
 black hat hackers

o 3. A specialist in the HR department is invited to promote


the cybersecurity program in community schools. Which
three topics would the specialist emphasize in the
presentation to draw students to this field? (Choose three.)
 a career-field in high-demand
 service to the public
 high earning potential

o 4. An organization allows employees to work from home


two days a week. Which technology should be
implemented to ensure data confidentiality as data is
transmitted?

 VPN

 5. Which type of networks poses increasing challenges to


cybersecurity specialists due to the growth of BYOD on
campus?

 wireless networks

 6. A cybersecurity specialist is working with the IT staff to


establish an effective information security plan. Which
combination of security principles forms the foundation of a
security plan?

 confidentiality, integrity, and availability

 7. Which framework should be recommended for establishing a


comprehensive information security management system in an
organization?

 ISO/IEC 27000

 8. What are three states of data during which data is vulnerable?


(Choose three.)
 data in-process
 stored data
 data in-transit

 9. Users report that the database on the main server cannot be


accessed. A database administrator verifies the issue and
notices that the database file is now encrypted. The organization
receives a threatening email demanding payment for the
decryption of the database file. What type of attack has the
organization experienced?

 ransomeware

 10. What three best practices can help defend against social
engineering attacks? (Choose three.)

 Educate employees regarding policies.


 Do not provide password resets in a chat window.
 Resist the urge to click on enticing web links.

 11. Which statement describes a distributed denial of service


attack?

 An attacker builds a botnet comprised of zombies.

 12. A cyber criminal sends a series of maliciously formatted


packets to the database server. The server cannot parse the
packets and the event causes the server crash. What is the type
of attack the cyber criminal launches?

 DoS

 13. An executive manager went to an important meeting. The


secretary in the office receives a call from a person claiming that
the executive manager is about to give an important
presentation but the presentation files are corrupted. The caller
sternly recommends that the secretary email the presentation
right away to a personal email address. The caller also states
that the executive is holding the secretary responsible for the
success of this presentation. Which type of social engineering
tactic would describe this scenario?
 intimidation

 14. What are the two most effective ways to defend against
malware? (Choose two.)

 Update the operating system and other application software.


 Install and update antivirus software

 15. The employees in a company receive an email stating that


the account password will expire immediately and requires a
password reset within 5 minutes. Which statement would
classify this email?

 It is a hoax.

 16. In which situation would a detective control be warranted?

 when the organization needs to look for prohibited activity

 17. An organization has implemented antivirus software. What


type of security control did the company implement?

 recovery control

 18. Alice and Bob are using public key encryption to exchange a
message. Which key should Alice use to encrypt a message to
Bob?

 the public key of Bob

 19. Which statement describes a characteristics of block


ciphers?

 Block ciphers result in output data that is larger than the input
data most of the time.

 20. The IT department is tasked to implement a system that


controls what a user can and cannot do on the corporate
network. Which process should be implemented to meet the
requirement?

 a set of attributes that describes user access rights


 21. Alice and Bob use a pre-shared key to exchange a
confidential message. If Bob wants to send a confidential
message to Carol, what key should he use?

 a new pre-shared key

 22. Which access control strategy allows an object owner to


determine whether to allow access to the object?

 DAC

 23. Which method is used by steganography to hide text in an


image file?

 least significant bit

 24. The X.509 standards defines which security technology?

 digital certificates

 25. Which hashing algorithm is recommended for the protection


of sensitive, unclassified information?

 SHA-256
 26. Technicians are testing the security of an authentication
system that uses passwords. When a technician examines the
password tables, the technician discovers the passwords are
stored as hash values. However, after comparing a simple
password hash, the technician then discovers that the values
are different from those on other systems. What are two causes
of this situation? (Choose two.)

 The systems use different hashing algorithms.


 One system uses hashing and the other uses hashing and
salting.

 27. You have been asked to work with the data collection and
entry staff in your organization in order to improve data integrity
during initial data entry and data modification operations.
Several staff members ask you to explain why the new data
entry screens limit the types and size of data able to be entered
in specific fields. What is an example of a new data integrity
control?
 a validation rule which has been implemented to ensure
completeness, accuracy, and consistency of data

 28. What technology should be implemented to verify the


identity of an organization, to authenticate its website, and to
provide an encrypted connection between a client and the
website?

 digital certificate

 29. Your organization will be handling market trades. You will be


required to verify the identify of each customer who is executing
a transaction. Which technology should be implemented to
authenticate and verify customer electronic transactions?

 digital certificates

 30. Alice and Bob are using a digital signature to sign a


document. What key should Alice use to sign the document so
that Bob can make sure that the document came from Alice?
 private key from Alice

 31. An organization has determined that an employee has been


cracking passwords on administrative accounts in order to
access very sensitive payroll information. Which tools would
you look for on the system of the employee? (Choose three)
 rainbow tables
 lookup tables
 reverse lookup tables

 32. An organization wants to adopt a labeling system based on


the value, sensitivity, and criticality of the information. What
element of risk management is recommended?
 asset classification

 33. An organization has recently adopted a five nines program


for two critical database servers. What type of controls will this
involve?
 improving reliability and uptime of the servers

 34. Being able to maintain availability during disruptive events


describes which of the principles of high availability?
 system resiliency

 35. Which risk mitigation strategies include outsourcing


services and purchasing insurance?
 transfer

 36. The awareness and identification of vulnerabilities is a


critical function of a cybersecurity specialist. Which of the
following resources can be used to identify specific details
about vulnerabilities?
 CVE national database

 37. Which technology would you implement to provide high


availability for data storage?
 RAID

 38. Which two values are required to calculate annual loss


expectancy? (Choose two.)
 annual rate of occurrence

 single loss expectancy

 39. What is it called when an organization only installs


applications that meet its guidelines, and administrators
increase security by eliminating all other applications?
 asset standardization

 40. There are many environments that require five nines, but a
five nines environment may be cost prohibitive. What is one
example of where the five nines environment might be cost
prohibitive?
 the New York Stock Exchange
 41. Which technology can be used to protect VoIP against
eavesdropping?
 encrypted voice messages
 42. Mutual authentication can prevent which type of attack?
 man-in-the-middle

 43. Which of the following products or technologies would you


use to establish a baseline for an operating system?
 Microsoft Security Baseline Analyzer

 44. What Windows utility should be used to configure password


rules and account lockout policies on a system that is not part
of a domain?
 Local Security Policy tool

 45. What describes the protection provided by a fence that is 1


meter in height?
 It deters casual trespassers only.

 46. Which wireless standard made AES and CCM mandatory?


 WPA2

 47. Which three protocols can use Advanced Encryption


Standard (AES)? (Choose three.)
 WPA2
 WPA
 802.11i

 48. Which website offers guidance on putting together a


checklist to provide guidance on configuring and hardening
operating systems?

 The National Vulnerability Database website

 49. Which law was enacted to prevent corporate accounting-


related crimes?
 Sarbanes-Oxley Act
 50. Which cybersecurity weapon scans for use of default
passwords, missing patches, open ports, misconfigurations,
and active IP addresses?
 vulnerability scanners

 51. A cybersecurity specialist is asked to identify the potential


criminals known to attack the organization. Which type of
hackers would the cybersecurity specialist be least concerned
with?

 white hat hackers

 52. What is an example of early warning systems that can be


used to thwart cybercriminals?
 Honeynet project

 53. Which technology should be used to enforce the security


policy that a computing device must be checked against the
latest antivirus update before the device is allowed to connect to
the campus network?
 NAC
 54. Which data state is maintained in NAS and SAN services?
 stored data

 55. Which technology can be used to ensure data


confidentiality?
 encryption

 56. What is an impersonation attack that takes advantage of a


trusted relationship between two systems?
 spoofing

 57. Users report that the network access is slow. After


questioning the employees, the network administrator learned
that one employee downloaded a third-party scanning program
for the printer. What type of malware might be introduced that
causes slow performance of the network?

 Worm
 58. What type of application attack occurs when data goes
beyond the memory areas allocated to the application?
 buffer overflow

 59. What type of attack has an organization experienced when


an employee installs an unauthorized device on the network to
view network traffic?
 sniffing
 60. A penetration testing service hired by the company has
reported that a backdoor was identified on the network. What
action should the organization take to find out if systems have
been compromised?
 Look for unauthorized accounts.

 61. Smart cards and biometrics are considered to be what type


of access control?
 Logical

 62. Which access control should the IT department use to


restore a system back to its normal state?
 Corrective

 63. A user has a large amount of data that needs to be kept


confidential. Which algorithm would best meet this requirement?
 3DES

 64. What happens as the key length increases in an encryption


application?

 Keyspace increases exponentially.

 65. You have been asked to describe data validation to the data
entry clerks in accounts receivable. Which of the following are
good examples of strings, integers, and decimals?

 female, 9866, $125.50

 66. Which hashing technology requires keys to be exchanged?


 HMAC

 67. What is a feature of a cryptographic hash function?
 The hash function is a one-way mathematical function.
 68. A VPN will be used within the organization to give remote
users secure access to the corporate network. What does IPsec
use to authenticate the origin of every packet to provide data
integrity checking?

 HMAC

 69. Your risk manager just distributed a chart that uses three
colors to identify the level of threat to key assets in the
information security systems. Red represents high level of risk,
yellow represents average level of threat and green represents
low level of threat. What type of risk analysis does this chart
represent?

 qualitative analysis

 70. Keeping data backups offsite is an example of which type of


disaster recovery control?

 preventive

 71. What are two incident response phases? (Choose two.)


 detection and analysis

 containment and recovery

 72. The team is in the process of performing a risk analysis on


the database services. The information collected includes the
initial value of these assets, the threats to the assets and the
impact of the threats. What type of risk analysis is the team
performing by calculating the annual loss expectancy?
 quantitative analysis

 73. What approach to availability provides the most


comprehensive protection because multiple defenses
coordinate together to prevent attacks?

 layering

 74. Which utility uses the Internet Control Messaging Protocol


(ICMP)?
 Ping
 75. In a comparison of biometric systems, what is the crossover
error rate?
 rate of false negatives and rate of false positives

 76. Which protocol would be used to provide security for


employees that access systems remotely from home?
 SSH

 77. Which threat is mitigated through user awareness training


and tying security awareness to performance reviews?
 user-related threats

 78. HVAC, water system, and fire systems fall under which of the
cybersecurity domains?

 physical facilities

 79. Technologies like GIS and IoE contribute to the growth of


large data stores. What are two reasons that these technologies
increase the need for cybersecurity specialists? (Choose two.)

 They collect sensitive information.


 They contain personal information.

 80. Which two groups of people are considered internal


attackers? (Choose two.)

 ex-employees
 trusted partners

 81. Which methods can be used to implement multifactor


authentication?

 passwords and fingerprints

 82. A security specialist is asked for advice on a security


measure to prevent unauthorized hosts from accessing the
home network of employees. Which measure would be most
effective?
 Implement a firewall.

 83. What type of attack will make illegitimate websites higher in


a web search result list?
 SEO poisoning

 84. What is a nontechnical method that a cybercriminal would


use to gather sensitive information from an organization?

 social engineering

 85. Which algorithm will Windows use by default when a user


intends to encrypt files and folders in an NTFS volume?

 AES

 86. Before data is sent out for analysis, which technique can be
used to replace sensitive data in nonproduction environments to
protect the underlying information?
 data masking substitution

 87. An organization plans to implement security training to


educate employees about security policies. What type of access
control is the organization trying to implement?
 administrative

 88. Passwords, passphrases, and PINs are examples of which


security term?
 authentication

 89. What technique creates different hashes for the same


password?
 salting

 90. You have been asked to implement a data integrity program


to protect data files that need to be electronically downloaded by
the sales staff. You have decided to use the strongest hashing
algorithm available on your systems. Which hash algorithm
would you select?

SHA-256

 91. What kind of integrity does a database have when all its rows
have a unique identifier called a primary key?
 entity integrity

 92. What approach to availability involves using file


permissions?
 limiting
 93. Which national resource was developed as a result of a U.S.
Executive Order after a ten-month collaborative study involving
over 3,000 security professionals?
 NIST Framework
 94. Which two protocols pose switching threats? (Choose two.)
 STP
 ARP
 95. What is the most difficult part of designing a cryptosystem?

 key management

 96. What technology should you implement to ensure that an


individual cannot later claim that he or she did not sign a given
document?

 digital signature

 97. Which type of cybercriminal attack would interfere with


established network communication through the use of
constructed packets so that the packets look like they are part of
the normal communication?

 packet forgery

 98. An organization just completed a security audit. Your


division was cited for not conforming to X.509 requirements.
What is the first security control you need to examine?
 digital certificates

 99. What technology can be implemented as part of an


authentication system to verify the identification of employees?
 a smart card reader

 100. Which technology can be used to prevent a cracker from


launching a dictionary or brute-force attack of a hash?
Which technology could be used to prevent a cracker from
launching a dictionary or brute-force attack off a hash?
 HMAC

 102. Netbus belongs to which malware type?


 backdoor

 103. A user complains about frequently receiving messages on


the smartphone that urges the user to visit different insurance
websites. If the user clicks the link to visit, a user login message
will pop up and ask the user to register first. Which wireless and
mobile device attack has the user experienced?

 SMiShing

You might also like