Home
Subjects
Textbook solutions
Create
Study sets, textbooks, questions
Log in
Sign up
Upgrade to remove ads
Only $35.99/year
Module 1-8 Quizzes
STUDY
Flashcards
Learn
Write
Spell
Test
PLAY
Match
Gravity
Terms in this set (66)
False
Incidents do not need to be handled immediately, make sure to understand what all has occurred and take a financial assessment first.
A successful phishing attempt against users
DDoS attack that brings down a web service
Ransomware attack that locks up their back end servers
All of these
Which of these would have a negative impact on a business?
True
Threats exploit vulnerabilities, which in turn cause risk.
Everyone should have access to the response playbook
What is the most important aspect of incident response?
Phishing scams
Which of these is not a good use case for cyber forensics?
PII
Credentials
Intellectual Property
All of the above
Hackers are typically after
Manipulating people to gain confidential information
Which best describes social engineering?
Urgent text from a friend asking for money
CEO randomly asking you for login help
Email asking you to click unknown website
All of these
What would be an example of a social engineering attack?
False
The top OWASP 10 attacks are constantly changing year after year
False
If you find a flaw and decide to exploit it just for research purposes, there are no legal implications. You only get in trouble when trying to monetize it.
Didn't patch their servers properly
What was the issue during the Equifax data breach?
Lack of encryption
Which of these are mobile threats?
Risks
Cybersecurity is all about understanding, managing, controlling, and mitigating _____
False
Internet privacy is highly regulated and has harsh fines when breached
Using the same credentials for multiple accounts
Opening unknown links
Staying logged into online services
All of these
Which of these are risks?
Signature based
This type of IDS identifies malware based on specific patterns of previous attacks
Signature Based Prevention
Which of these is not a type of IPS:
Scans and identifies hosts for malware
Anti-malware is software that
Remote Wipe
Password Reinforcement
Data Encryption
All of these
Which of these is a feature of Mobile Device Management?
False
The absence of security awareness training in one department does not put another at risk, they are all segmented.
Public Key Infrastructure
Which of the following allows secure and private data exchange on an unsecure network?
Identifying
Reporting
Treating
All of the above
Vulnerability Management and Scanning is the process of
Correlating system information with known vulnerabilities
Which is part of the vulnerability scanning process?
Networked based security that controls traffic flow
What is a firewall?
False
Penetration testing is not necessary and typically a costly mistake that can be avoided with good tools.
Symptoms of an incoming attack
Indicators of compromise are ________.
Unusual outbound traffic
Which of these is not a sign of a cyber attack?
Companies not realizing the high value assets
Which of these is a real challenge faced by corporations?
DDoS attacks
What type of a cyber attack do botnets typically launch from their infected computers?
True
Web applications need constant access to the backend servers even if it means a risk of an attack.
The safer your enterprise will be
The faster you find a security issue
analyzes running code in your development stage
Dynamic testing _______.
Obfuscation
The process of making your code harder to reengineer is called
Keeping software patched and up to date
Following OWASP top 10
Security Audits
All of the above
Best practice for secure application development
Authentication
TLS is the a protocol that provides
HTTPS
Which of the following protocols does a website encrypt the session with a digital certificate?
Security cameras
Map vulnerabilities
Locks
All of the above
How do you keep a server room secure?
Directory Traversal Attack
This attack exploits bugs in the web server to gain unauthorized access to files / folders that are not on the public domain.
Demilitarized zone
When firewalls are placed in a network, which zone contains Internet-facing services?
Firewalls track the state of a TCP conversation
What is the reason firewalls are considered stateful?
Scalability
What is a benefit of site-to-site IPSec VPNs?
AH or Authentication Header
Which protocol does IPSec use to check integrity of data packets?
Weak passwords
WPA-Personal is also vulnerable. What is the biggest vulnerability it has?
WPA2-Enterprise
You need to implement a secure wireless LAN. You want to implement AES encryption, 802.1X-EAP & key management protocol. You will be installing too many APs & clients to configure each one with a pre-shared key passphrase. Which wifi cert is needed?
Gather info about potential network attackers
Which of the following best describes a honeypot?
To filter Internet traffic for internal systems.
In what situation would you employ a proxy server? (Choose the best answer)
Provides network access to only authorized systems.
Which statement describes the use of a Network Admission Control (NAC) solution?
IPSec
Which is a collection of protocols designed by the IETF (Internet Engineering Task Force) to provide security for a packet at the network level
Security
Encryption improves a computers
One private key is used for encryption and decryption
In a symmetric key encryption
A encrypts with B's public key
In asymmetric key encryption if A wants to send an encrypted message
True
Hashing is a one way function
Storing user passwords
Which is the best use case for hashing?
Harder to crack
Salting hashed data makes it
Large key sizes so it's tougher to crack
What is the most important factor of cryptographic algorithms?
False
You can derive a private key from a public key, and a public key from a private key.
PKI, TLS and SSL (All the above.)
Which internet protocols utilize cryptography?
B decrypts with B's private key
In asymmetric key encryption if B wants to decrypt A's message
Switch
A network technician needs to connect a user's PC to the wired Ethernet network. What is the BEST device the technician should use to connect the PC into the wired network?
MAC Address
Switches make intelligent switching decisions by learning which devices are connected to them. Which of the following types of addresses does a switch learn about from connected hosts?
Router
This type of device uses IP addresses to determine where to send network traffic.
Router
This type of device serves as the gateway (aka default gateway) for IP traffic to leave the LAN.
Client
This type of device is a workstation used by an end user which provides the user with access to the network.
Wireless Access Point
This Type of device provides a client with network access over wireless media.
Server
This type of device can be local to the network or in a remote location and provides services to clients such as sharing of resources and files.
False
Hubs should be used instead of switches because hubs provide for better network performance than switches
Sets with similar terms
CEH 9
125 terms
Chapter 4 Quiz
15 terms
SY0-401:3 TS Quiz Threats and Vulnerabilities
96 terms
Bootcamp
553 terms
Sets found in the same folder
NCSA
406 terms
CompTIA Security+ Acronyms
301 terms
Security +
310 terms
Other sets by this creator
Module 8 Quiz
5 terms
Module 7 Quiz
10 terms
Module 6 Quiz
10 terms
Module 5 Quiz
5 terms
Verified questions
SOCIOLOGY
Design a school that will function in the year 2020, taking into account predicted advances in technology and presumed changes in social relationships and social roles.
SOCIOLOGY
What is the relationship between sport and achievement-oriented values?
SOCIOLOGY
Identify a primary group and a secondary group to which you belong. Describe three functions of each of these groups based on your personal experiences. Then compare and contrast your relationships in each group.
SOCIOLOGY
Provide an example of using precollected data.
Other Quizlet sets
Exam 3 Day 2 Flashcards
45 terms
KIN3304: Chapter 6
35 terms
Technology 7 Chapter 2 Test
10 terms
Corrections Ch.8
27 terms
Related questions
QUESTION
Which option is a program that appears to be a legitimate application, utility, game, or screensaver and performs malicious activities surreptitiously?
QUESTION
Which statement accurately describes incoming message assignments functionality in Hootsuite mobiles?
QUESTION
What video viewed in class illustrated C. Wright Mills' idea that CEOs of multinational corporations operate behind the scenes to influence the political system and laws that serve their financial interests?
QUESTION
T/F almost all security breaches can be traced back to technology lapses; personnel or procedural factors rarely factor in