Intro Cyber Final
Intro Cyber Final
Intro Cyber Final
VPN
wireless networks
ISO/IEC 27000
ransomeware
10. What three best practices can help defend against social
engineering attacks? (Choose three.)
DoS
14. What are the two most effective ways to defend against
malware? (Choose two.)
It is a hoax.
recovery control
18. Alice and Bob are using public key encryption to exchange a
message. Which key should Alice use to encrypt a message to
Bob?
Block ciphers result in output data that is larger than the input
data most of the time.
DAC
digital certificates
SHA-256
26. Technicians are testing the security of an authentication
system that uses passwords. When a technician examines the
password tables, the technician discovers the passwords are
stored as hash values. However, after comparing a simple
password hash, the technician then discovers that the values
are different from those on other systems. What are two causes
of this situation? (Choose two.)
27. You have been asked to work with the data collection and
entry staff in your organization in order to improve data integrity
during initial data entry and data modification operations.
Several staff members ask you to explain why the new data
entry screens limit the types and size of data able to be entered
in specific fields. What is an example of a new data integrity
control?
a validation rule which has been implemented to ensure
completeness, accuracy, and consistency of data
digital certificate
digital certificates
40. There are many environments that require five nines, but a
five nines environment may be cost prohibitive. What is one
example of where the five nines environment might be cost
prohibitive?
the New York Stock Exchange
41. Which technology can be used to protect VoIP against
eavesdropping?
encrypted voice messages
42. Mutual authentication can prevent which type of attack?
man-in-the-middle
Worm
58. What type of application attack occurs when data goes
beyond the memory areas allocated to the application?
buffer overflow
65. You have been asked to describe data validation to the data
entry clerks in accounts receivable. Which of the following are
good examples of strings, integers, and decimals?
HMAC
69. Your risk manager just distributed a chart that uses three
colors to identify the level of threat to key assets in the
information security systems. Red represents high level of risk,
yellow represents average level of threat and green represents
low level of threat. What type of risk analysis does this chart
represent?
qualitative analysis
preventive
layering
78. HVAC, water system, and fire systems fall under which of the
cybersecurity domains?
physical facilities
ex-employees
trusted partners
social engineering
AES
86. Before data is sent out for analysis, which technique can be
used to replace sensitive data in nonproduction environments to
protect the underlying information?
data masking substitution
91. What kind of integrity does a database have when all its rows
have a unique identifier called a primary key?
entity integrity
key management
digital signature
packet forgery
SMiShing