Time limit: 0
Quiz-summary
0 of 68 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
Information
Introduction to Cybersecurity: Course Final Exam Test Online
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 68 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- Answered
- Review
-
Question 1 of 68
1. Question
1 pointsWhich of the following firewalls hides or masquerades the private addresses of network hosts?Correct
Incorrect
-
Question 2 of 68
2. Question
1 pointsCarrying out a multi-phase, long-term, stealthy and advanced operation against a specific target is often referred to as what?Correct
Incorrect
-
Question 3 of 68
3. Question
1 pointsYou are configuring access settings to require employees in your organization to authenticate first before accessing certain web pages. Which requirement of information security is addressed through this configuration?Correct
Incorrect
Hint
Confidentiality is a set of rules that prevents sensitive information from being disclosed to unauthorized people, resources and processes. Methods to ensure confidentiality include data encryption, identity proofing and two factor authentication. -
Question 4 of 68
4. Question
1 pointsWhat are the objectives of ensuring data integrity? (Choose two correct answers)Correct
Incorrect
Hint
The objectives for data integrity include data not being altered during transit and not being changed by unauthorized entities. Authentication and encryption are methods to ensure confidentiality. Data being available all the time is the goal of availability. -
Question 5 of 68
5. Question
1 pointsAn organization is experiencing overwhelming visits to a main web server. You are developing a plan to add a couple of more web servers for load balancing and redundancy. Which requirement of information security is addressed by implementing the plan?Correct
Incorrect
-
Question 6 of 68
6. Question
1 pointsWhat of the following are examples of cracking an encrypted password? (Choose four correct answers)Correct
Incorrect
-
Question 7 of 68
7. Question
1 pointsImproper management of physical access to a resource, such as a file, can lead to what type of security vulnerability?Correct
Incorrect
-
Question 8 of 68
8. Question
1 pointsA medical office employee sends emails to patients about their recent visits to the facility. What information would put the privacy of the patients at risk if it was included in the email?Correct
Incorrect
-
Question 9 of 68
9. Question
1 pointsWhat is the best way to avoid getting spyware on a machine?Correct
Incorrect
-
Question 10 of 68
10. Question
1 pointsYou are surfing the Internet using a laptop at a public Wi-Fi cafe. What should you check first before you connect to the public network?Correct
Incorrect
Hint
You should always verify that your device isn’t configured with file and media sharing and that it requires user authentication with encryption. -
Question 11 of 68
11. Question
1 pointsWhat is the main function of the Cisco Security Incident Response Team?Correct
Incorrect
-
Question 12 of 68
12. Question
1 pointsWhich of the following firewalls are placed in front of web services to protect, hide, offload and distribute access to web servers?Correct
Incorrect
Hint
Placed in front of web servers, reverse proxy servers protect, hide, offload and distribute access to web servers. -
Question 13 of 68
13. Question
1 pointsWhich of the following certifications meets the U.S. Department of Defense Directive 8570.01-M requirements, which is important for anyone looking to work in IT security for the federal government?Correct
Incorrect
Hint
This is an entry-level security certification that meets the U.S. Department of Defense Directive 8570.01-M requirements, which is an important item for anyone looking to work in IT security for the federal government. -
Question 14 of 68
14. Question
1 pointsOne of your colleagues has lost her identification badge. She is in a hurry to get to a meeting and does not have time to visit Human Resources to get a temporary badge. You lend her your identification badge until she can obtain a replacement. Is this behavior ethical or unethical?Correct
Incorrect
-
Question 15 of 68
15. Question
1 pointsWhich of the following certifications tests your understanding and knowledge in how to look for weaknesses and vulnerabilities in target systems using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner?Correct
Incorrect
Hint
This certification tests your understanding and knowledge of how to look for weaknesses and vulnerabilities in target systems using the same knowledge and tools as a malicious hacker but in a lawful and legitimate manner. -
Question 16 of 68
16. Question
1 pointsWhat is the main purpose of cyberwarfare?Correct
Incorrect
Hint
The main reason for resorting to cyberwarfare is to gain advantage over adversaries, whether they are nations or competitors. -
Question 17 of 68
17. Question
1 pointsWhat vulnerability occurs when the output of an event depends on ordered or timed outputs?Correct
Incorrect
-
Question 18 of 68
18. Question
1 pointsWhat do you call the vulnerabilities discovered by Google security researchers that affect almost all CPUs released since 1995? (Select two correct answers)Correct
Incorrect
-
Question 19 of 68
19. Question
1 pointsIf developers attempt to create their own security algorithms, it will likely introduce what type of vulnerabilities?Correct
Incorrect
Hint
Systems and sensitive data can be protected through techniques such as authentication, authorization and encryption. Developers should stick to using security techniques and libraries that have already been created, tested and verified and should not attempt to create their own security algorithms. These will only likely introduce new vulnerabilities. -
Question 20 of 68
20. Question
1 pointsWhich technology creates a security token that allows a user to log in to a desired web application using credentials from a social media website?Correct
Incorrect
Hint
Open Authorization is an open standard protocol that allows end users to access third party applications without exposing their user passwords. -
Question 21 of 68
21. Question
1 pointsWhich of the following security implementations use biometrics? (Choose two correct answers)Correct
Incorrect
-
Question 22 of 68
22. Question
1 pointsWhich of the following firewalls filters traffic based on source and destination IP addresses?Correct
Incorrect
-
Question 23 of 68
23. Question
1 pointsWhich of the following firewalls filters web content requests such as URLs and domain names?Correct
Incorrect
-
Question 24 of 68
24. Question
1 pointsA port scan returns a ‘dropped’ response. What does this mean?Correct
Incorrect
-
Question 25 of 68
25. Question
1 pointsDuring a meeting with the Marketing department, a representative from IT discusses features of an upcoming product that will be released next year. Is this employee’s behavior ethical or unethical?Correct
Incorrect
-
Question 26 of 68
26. Question
1 pointsWhich of the following is an entry-level certification for newcomers who are preparing to start their career in cybersecurity?Correct
Incorrect
Hint
This is an entry-level certification for newcomers who are preparing to start their career in the cybersecurity field. -
Question 27 of 68
27. Question
1 points‘Cybersecurity certifications are a way for you to verify your skills and knowledge and can also boost your career.’ Is this statement true or false?Correct
Incorrect
-
Question 28 of 68
28. Question
1 pointsWhen describing malware, what is a difference between a virus and a worm?Correct
Incorrect
Hint
Malware can be classified as follows: Virus (self-replicates by attaching to another program or file) Worm (replicates independently of another program) Trojan horse (masquerades as a legitimate file or program) Rootkit (gains privileged access to a machine while concealing itself) Spyware (collects information from a target system) Adware (delivers advertisements with or without consent) Bot (waits for commands from the hacker) Ransomware (holds a computer system or data captive until payment isreceived) -
Question 29 of 68
29. Question
1 pointsAn employee is laid off after fifteen years with the same organization. The employee is then hired by another organization within a week. In the new organization, the employee shares documents and ideas for products that the employee proposed at the original organization. Is the employee’s behavior ethical or unethical?Correct
Incorrect
-
Question 30 of 68
30. Question
1 pointsWhich of the following firewalls filters traffic based on the user, device, role, application type and threat profile?Correct
Incorrect
-
Question 31 of 68
31. Question
1 pointsWhat names are given to a database where all cryptocurrency transactions are recorded? (Select two correct answers)Correct
Incorrect
Hint
Cryptocurrency owners keep their money in encrypted, virtual ‘wallets.’ When a transaction takes place between the owners of two digital wallets, the details are recorded in a decentralized, electronic ledger or blockchain system. This means it is carried out with a degree of anonymity and is self-managed, with no interference from third parties such as central banks or government entities. -
Question 32 of 68
32. Question
1 pointsWhich of the following items are states of data? (Choose three correct answers)Correct
Incorrect
Hint
Processing refers to data that is being used to perform an operation such as updating a database record (data in process). Storage refers to data stored in memory or on a permanent storage device such as a hard drive, solid-state drive or USB drive (data at rest). Transmission refers to data traveling between information systems (data in transit). -
Question 33 of 68
33. Question
1 points‘Internet-based cameras and gaming gear are not subject to security breaches.’ Is this statement true or false?Correct
Incorrect
-
Question 34 of 68
34. Question
1 pointsWhat vulnerability occurs when data is written beyond the memory areas allocated to an application?Correct
Incorrect
-
Question 35 of 68
35. Question
1 pointsAn organization’s IT department reports that their web server is receiving an abnormally high number of web page requests from different locations simultaneously. What type of security attack is occurring?Correct
Incorrect
-
Question 36 of 68
36. Question
1 pointsWhich of the following are commonly used port scanning applications? (Select two correct answers)Correct
Incorrect
-
Question 37 of 68
37. Question
1 pointsWhat action will an IDS take upon detection of malicious traffic?Correct
Incorrect
Hint
An IDS, or intrusion detection system, is a device that can scan packets and compare them to a set of rules or attack signatures. If the packets match attack signatures, then the IDS can create an alert and log the detection. -
Question 38 of 68
38. Question
1 pointsWhich of the following statements best describes cybersecurity?Correct
Incorrect
-
Question 39 of 68
39. Question
1 points‘After a data breach, it’s important to educate employees, partners and customers on how to prevent future breaches.’ Is this statement true or false?Correct
Incorrect
-
Question 40 of 68
40. Question
1 pointsAn employee points out a design flaw in a new product to the department manager. Is this employee’s behavior ethical or unethical?Correct
Incorrect
-
Question 41 of 68
41. Question
1 points‘Data coming into a program should be sanitized, as it could have malicious content, designed to force the program to behave in an unintended way.’ This statement describes what security vulnerability?Correct
Incorrect
-
Question 42 of 68
42. Question
1 pointsWhich of the following are examples of on-path attacks? (Choose two correct answers)Correct
Incorrect
-
Question 43 of 68
43. Question
1 pointsWhich of the following firewalls filters traffic based on application, program or service?Correct
Incorrect
-
Question 44 of 68
44. Question
1 pointsA port scan returns a ‘closed’ response. What does this mean?Correct
Incorrect
-
Question 45 of 68
45. Question
1 points‘Cryptocurrency transactions are digital.’ Is this statement true or false?Correct
Incorrect
-
Question 46 of 68
46. Question
1 pointsWhat do you call a digital asset designed to work as a medium of exchange that uses strong encryption to secure a financial transaction?Correct
Incorrect
-
Question 47 of 68
47. Question
1 pointsWhich of the following tools used for incident detection can be used to detect anomalous behavior, command and control traffic, and detect infected hosts? (Choose two correct answers)Correct
Incorrect
-
Question 48 of 68
48. Question
1 pointsWhat name is given to a group of bots, connected through the Internet, with the ability to be controlled by a malicious individual or group?Correct
Incorrect
-
Question 49 of 68
49. Question
1 pointsWhat is the best approach for preventing a compromised IoT device from maliciously accessing data and devices on a local network?Correct
Incorrect
-
Question 50 of 68
50. Question
1 pointsWhat name is given to the emerging threat that hides on a computer or mobile device and uses that machine’s resources to mine cryptocurrencies?Correct
Incorrect
-
Question 51 of 68
51. Question
1 pointsA port scan returns an ‘open’ response. What does this mean?Correct
Incorrect
-
Question 52 of 68
52. Question
1 pointsAn employee is at a restaurant with friends and tells them about an exciting new video game that is under development at the organization they work for. Is this employee’s behavior ethical or unethical?Correct
Incorrect
-
Question 53 of 68
53. Question
1 points‘An advanced persistent threat (APT) is usually well funded.’ Is this statement true or false?Correct
Incorrect
-
Question 54 of 68
54. Question
1 pointsIn networking, what name is given to the identifier at both ends of a transmission to ensure that the right data is passed to the correct application?Correct
Incorrect
-
Question 55 of 68
55. Question
1 points‘An employee does something as an organization representative with the knowledge of that organization and this action is deemed illegal. The organization is legally responsible for this action.’ Is this statement true or false?Correct
Incorrect
-
Question 56 of 68
56. Question
1 pointsWhat tool is used to lure an attacker so that an administrator can capture, log and analyze the behavior of the attack?Correct
Incorrect
-
Question 57 of 68
57. Question
1 points‘A data breach does not impact the reputation of an organization.’ Is this statement true or false?Correct
Incorrect
-
Question 58 of 68
58. Question
1 pointsWhich of the following certifications is aimed at high school and early college students, as well as anyone interested in a career change?Correct
Incorrect
-
Question 59 of 68
59. Question
1 pointsWhich of the following firewalls filters traffic based on source and destination data ports and filtering based on connection states?Correct
Incorrect
-
Question 60 of 68
60. Question
1 pointsWhich of the following are categories of security measures or controls? (Choose three correct answers)Correct
Incorrect
-
Question 61 of 68
61. Question
1 points‘A botnet can have tens of thousands of bots, or even hundreds of thousands.’ Is this statement true or false?Correct
Incorrect
-
Question 62 of 68
62. Question
1 pointsFor what purpose would a network administrator use the Nmap tool?Correct
Incorrect
-
Question 63 of 68
63. Question
1 pointsWhich of the following certifications does not expire or require periodic recertification and is geared towards post-secondary graduates and those interested in a career change?Correct
Incorrect
-
Question 64 of 68
64. Question
1 pointsWhat type of attack uses zombies?Correct
Incorrect
Hint
A Distributed DoS (DDoS) attack is similar to a DoS attack but originates from multiple, coordinated sources. For example:- An attacker builds a network (botnet) of infected hosts called zombies, which are controlled by handler systems.
- The zombie computers will constantly scan and infect more hosts, creating more and more zombies.
- When ready, the hacker will instruct the handler systems to make the botnet of zombies carry out a DDoS attack.
-
Question 65 of 68
65. Question
1 pointsWhat is the purpose of a backdoor?Correct
Incorrect
-
Question 66 of 68
66. Question
1 pointsWhich of the following firewalls filters ports and system service calls on a single computer operating system?Correct
Incorrect
-
Question 67 of 68
67. Question
1 pointsWhat type of attack disrupts services by overwhelming network devices with bogus traffic?Correct
Incorrect
Hint
DDoS, or distributed denial of service, attacks are used to disrupt service by overwhelming network devices with bogus traffic. -
Question 68 of 68
68. Question
1 points‘Cryptocurrencies are handled on a centralized exchange.’ Is this statement true or false?Correct
Incorrect