Cyber-security Final Exam

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/75

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

76 Terms

1
New cards

A web server administrator is configuring access settings to require users to authenticate first before accessing certain web pages. Which requirement of information security is addressed through the configuration?

Confidentiality

2
New cards

Which two types of institutions do malicious web pages often look like?

Financial and Bank

3
New cards

An employee does something as a company representative with the knowledge of that company and this action is deemed illegal. The company would be legally responsible for this action.

True

4
New cards

What are two things that all digital devices need in order to work?

Data and a Computer Program

5
New cards

While on a service call at a customer site, you are discussing the problem with the customer when your cell phone rings. You check the caller ID, and you see that the call is related to parts you ordered for another customer.

Ask the customer if they mind if you take the call, and then step into the hallway to briefly talk on the phone.

6
New cards

A user sends a print job to network printer and it prints page after page of random characters. He calls the Help Desk and a technician discovers that the wrong printer driver has been loaded on the user's workstation. The technician loads the correct driver, verifies that the system works correctly and documents the resolution.

Educate the user as to how the problem was resolved and verify that they are satisfied with the result.

7
New cards

The IT department is reporting that a company web server is receiving an abnormally high number of web page requests from different locations simultaneously. Which type of security attack is occurring?

DDoS

8
New cards

Which of the following MAC features is used to launch apps, switch between running apps, access the Trash, and also to access specific folders.

Dock

9
New cards

While answering Help Desk calls, a field customer calls and complains that he cannot print to a work group laser printer.

Have you ever printed to that printer?

10
New cards

What are three benefits of cloud computing?

It enables access to organizational data anywhere and at any time, It eliminates or reduces the need for onsite IT equipment, maintenance, and management, and It streamlines the IT operations of an organization by subscribing only to needed services.

11
New cards

Which of the following are considered input devices?

Scanner, Keyboard, and Microphone

12
New cards

What is the largest network in existence?

The Internet

13
New cards

Which of the following features should you look for when selecting a vacuum cleaner for your cleaning kit?

Non-static generating and One that blows well as vacuums

14
New cards

You are helping a customer over the phone who needs to connect a monitor that uses a digital interface. Which port should you instruct her to look for on the back of her PC?

DVI

15
New cards

Hard drives are best stored in a

Static Shielding Bag

16
New cards

What action will an IDS take upon detection of malicious traffic?

Create a network alert and log the detection

17
New cards

Which of the following statement about cleaning monitors and display devices is true?

A monitor should be powered off and cleaned with a lint free cloth.

18
New cards

For what purpose would a network administrator use the Nmap tool?

Detection and identification of open ports

19
New cards

What type of attack uses zombies?

DDoS

20
New cards

Which type of network is the connection between a Bluetooth headset and a vehicle?

PAN

21
New cards

Which of the following is a myth regarding electrostatic discharge(ESD)?

If you can't feel ESD, the surge is not sufficient to harm computer components.

22
New cards

What are two requirements to connect a smart device to a home wireless network?

IP Addressing and the SSID

23
New cards

What tool is used to lure an attacker so that an administrator can capture, log, and analyze the behavior of the attack?

Honeypot

24
New cards

What device provides auto discovery services for smart devices that are connected to the network?

A home gateway

25
New cards

You are responsible for managing client workstations for your company. A frantic user calls you one morning exclaiming that "nothing is working."

Identify the problem

26
New cards

What is one main function of the Cisco Security Incident Response Team?

To ensure company, system, and data preservation

27
New cards

Which of the following are common tools used to physically clean the inside of a computer?

Compressed air and a Natural bristle brush

28
New cards

You have just installed a new USB card reader in your Windows computer. Every time you perform certain action using the card reader, you get an error message you you've never seen before.

Check the manufacturer's website for information about the error.

29
New cards

What is an example of the a Cyber Kill Chain?

Planned process of cyberattack

30
New cards

Cloud services

A collection of data centers or connected servers that provide anywhere anytime access to data and applications

31
New cards

Fog computing

An architecture that utilizes edge devices for data pre-processing and storage

32
New cards

Distributed processing

Breaks large volumes of data into smaller pieces which are processed by computers in different locations

33
New cards

Hadoop

A comprehensive ecosystem of open-source software for big data management

34
New cards

What are two objectives of ensuring data integrity?

Data is unaltered during transit and Data is not changed by unauthorized entities.

35
New cards

Which of the following are considered computer hardware?

Printer and Motherboard

36
New cards

What are two security implementations that use bio-metrics?

Voice Recognition and Fingerprint

37
New cards

You are looking at a female TRS connector on the computer. Which device uses this connector?

Speaker

38
New cards

Which tool would you use to grab and lift small objects?

3-prong holder

39
New cards

You need to trace the route that a Cat 6 UTP cable takes through the ceiling and walls of your building. Which tool should you use?

A tone generator

40
New cards

A printer is behaving erratically, and you suspect a faulty port. What tool can you use to test the parallel port?

Loop-back Plug

41
New cards

What is the main purpose of cyberwarfare?

To gain advantage over adversaries

42
New cards

Which of the following will help reduce the threat of static discharge when working on computer hardware?

Store the unused components in static shielding bags and Remain in physical contact with the server chassis at all times.

43
New cards

A user asks you to perform a task that you do now know how to do and is not in the scope of your job duties. What is the best way to respond?

Explain to the user that this is not a task you can perform, but you will do your best to contact someone who can perform the task.

44
New cards

Which Windows tools would you use to browse the file system on a drive?

File Explorer, Windows Explorer, and Computer

45
New cards

What is the best method to avoid getting spyware on a machine?

Install software only from trusted websites.

46
New cards

You are trying to help a co-worker order a UPS for each PC in her remote office location. What rating is used to specify the size of a UPS?

VA

47
New cards

You need to find a file that you saved on your computer. You will have to search for it because you don't remember which directory it was saved in. Which Windows feature improves the speed of file searches on your computer?

Indexing Service

48
New cards

A Help Desk technician receives a call from a user who is unable to download new messages from the company's email server. The technician tells the user to open a command prompt and ping the email server and check the SMTP and POP3 server IP address.

The technician used jargon that the user probably didn't understand.

49
New cards

Multiprocessing

Ability to use multiple processing devices.

50
New cards

Multitasking

Ability to run multiple applications simultaneously.

51
New cards

Multithreading

Ability to run multiple parts of an application simultaneously.

52
New cards

You are connecting an older, dot matrix printer to a computer. The printer's cable is a D-shaped connector with 25 pins. Which port type does the printer connect to?

Parallel port

53
New cards

What are loopback plugs used for?

Testing ports by returning output signals as input.

54
New cards

Which stage of the kill chain used by attackers focuses on the identification and selection of targets?

Reconnaissance

55
New cards

Which technology creates a security token that allows a user to log in to a desired web application using credentials from a social media website?

Open Authorization

56
New cards

Which component of Windows prompts the user for credentials or permission to minimize the dangers of unintended software installations?

User Account Control (UAC)

57
New cards

With artificial intelligence, smart devices can modify processes and settings on the fly in response to changes on the network.

True

58
New cards

Which of the following is most helpful in keeping a computer cool?

Vacuum dust from the system regularly and Verify that cooing fans are not circulating air in the wrong directions.

59
New cards

Which of the following items are likely to be displayed in the Notification Area of a computer running the Windows operating system?

Time and Volume

60
New cards

What is the best approach to prevent a compromised IoT device from maliciously accessing data and devices on a local network?

Place all IoT devices on an isolated network

61
New cards

You are a PC technician for a company. You receive the following email from an employee:

My email doesn't work. I keep getting email sent back to me, and I can't find any of my old emails. I don't think the email program has ever worked well.

Whe you arrive at the employee's desk you observe how the employee accomplished normal email tasks. You quickly determine that the problem is not with the email program but that the employee needs to be trained on how to use the program. You have several high priority task that you need to accomplish by the end of the day.

What is the BEST way for you to respond?

Set up an appointment to train the employee on how to complete common email tasks.

62
New cards

Which statement describes cybersecurity?

It is an ongoing effort to protect Internet-connected systems and the data associated with those systems from unauthorized use or harm.

63
New cards

You are providing telephone support for a user who is trying to connect a computer to a projector. You know that the projector only has a VGA port.

D-shaped with 15 pins

64
New cards

Which tool would you use to measure electrical properties such as voltage, amps, and resistance?

Multimeter

65
New cards

Which type of network consists of wired computers in a college classroom?

LAN

66
New cards

ESD is most likely to occur

In a cool, dry atmosphere

67
New cards

Which operation system(s) include the following features?

Cortana

Cloud Storage

Continuum

Microsoft Store

Microsoft Edge

Windows 10

68
New cards

When describing malware, what is a difference between a virus and a worm?

A virus replicates itself by attaching to another file, whereas a worm can replicate itself independently.

69
New cards

To prevent ESD when replacing internal components, you attach an anti-static wrist strap to your wrist. Where should the other end be fastened?

Metal area on the computer case and an Anti-static mat

70
New cards

Which of the following is the term used for a set of programs that acts as an interface between the applications that are running on a computer and the computer's hardware?

The operating system

71
New cards

A medical office employee sends emails to patients about recent patient visits to the facility. What information would put the privacy of the patients at risk if it was included in the email?

Patient Records

72
New cards

A PC technician knows he will be late to an appointment with a customer. Which of the following actions should the technician take?

Contact the customer and apologize and Give a realistic time frame for your arrival.

73
New cards

Which two tools used for incident detection can be used to detect anomalous behavior, to detect command and control traffic, and to detect infected hosts?

Intrusion detection system and NetFlow

74
New cards

What is the purpose of Packet Tracer?

To simulate and visualize one or more networks

75
New cards

A company is experiencing overwhelming visits to a main web server. The IT department is developing a plan to add a couple more web servers for load balancing and redundancy. Which requirement of information security is addressed by implementing the plan?

Availability

76
New cards

Which of the following is a benefit of good documentation?

It saves time and money in troubleshooting problems.