Author: ITExamAnswers

Introduction to IoT – Chapter 5 Quiz Answers

1. What are three examples of personally identifiable information? (Choose three.) bank account number home water usage vehicle identification number birth date home thermometer value vehicle fuel consumption 2. Which two online activities pose high security risks? (Choose two.) verifying a banking site URL before entering information sharing …

Introduction to IoT – Chapter 4 Quiz Answers

1. What term is used to describe the intelligence demonstrated by machines? machine learning natural intelligence artificial intelligence IBN 2. What is artificial intelligence? the ability of a device to “learn” based on code and provided data the intersection of innovation and society the gathering of data from …

Module 26: Evaluating Alerts Quiz Answers

1. What classification is used for an alert that correctly identifies that an exploit has occurred? false negative true positive true negative false positive 2. Which type of analysis relies on predefined conditions and can analyze applications that only use well-known fixed ports? deterministic probabilistic log statistical 3. …

Module 25: Network Security Data Quiz Answers

1. What is a feature of the tcpdump tool? It records metadata about packet flows. It uses agents to submit host logs to centralized management servers. It can display packet captures in real time or write them to a file. It provides real-time reporting and long-term analysis of …

Module 24: Technologies and Protocols Quiz Answers

1. A cyberanalyst is reviewing an entry-point ACL. What three types of ICMP traffic should be allowed to access an internal network from the internet? (Choose three.) destination unreachable time exceeded ping request reply squelch 2. A company decides to purchase a device capable of managing load balancing …

Module 23: Endpoint Vulnerability Quiz Answers

1. In profiling a server, what defines what an application is allowed to do or run on a server? software environment service accounts user accounts listening ports 2. Which metric class in the CVSS Basic Metric Group identifies the impacts on confidentiality, integrity, and availability? Impact Exploit Code …

Module 22: Endpoint Protection Quiz Answers

1. Which antimalware software approach can recognize various characteristics of known malware files to detect a threat? heuristics-based routing-based behavior-based signature-based 2. In most host-based security suites, which function provides robust logging of security-related events and sends logs to a central location? safe browsing intrusion detection and prevention …

Module 21: Public Key Cryptography Quiz Answers

1. Which statement describes the Software-Optimized Encryption Algorithm (SEAL)? SEAL is a stream cipher. It is an example of an asymmetric algorithm. It requires more CPU resources than software-based AES does. It uses a 112-bit encryption key. 2. Which statement is a feature of HMAC? HMAC is based …