Cybersecurity Essentials 1.1 Chapter 2 Quiz Answers Full Questions Chapter 2: The Cybersecurity Cube 1. What is identified by the first dimension of the cybersecurity cube? tools knowledge goals safeguards rules 2. What are three types of sensitive information? (Choose three.) declassified public PII business published classified 3. …
Cybersecurity Essentials 1.1 Chapter 1 Quiz Answers Full Questions Chapter 1: Cybersecurity – A World of Experts and Criminals 1. What type of attack uses many systems to flood the resources of a target, thus making the target unavailable? ping sweep DoS spoof DDoS 2. What does the …
2.1.9 Packet Tracer – Explore File and Data Encryption (Answers) Objectives Part 1: Discover the FTP Account Credentials for Mary Part 2: Upload Confidential Data using FTP Part 3: Discover the FTP Account Credentials for Bob Part 4: Download Confidential Data using FTP Part 5: Decrypt the Contents …
2.1.8 Packet Tracer – File and Data Integrity Checks (Answers) Objectives Part 1: Recover Files after a Cyber Attack Part 2: Using Hashing to Verify File Integrity Part 3: Using HMAC to Verify File Integrity Background In this Packet Tracer (PT) activity, you will verify the integrity of …
1.3.14 Packet Tracer – Investigate a Threat Landscape (Answers) Objectives Part 1: Investigate a Network Configuration Vulnerability Part 2: Investigate a Phishing Malware Vulnerability Part 3: Investigate a Wireless Network and DNS Vulnerability Background / Scenario The threat landscape consists of all the vulnerabilities that can be exploited …
1.3.6 Packet Tracer – Build a Home Network (Answers) Objectives Part 1: Connect and Configure Devices Part 2: Use Network Services Part 3: Use Packet Tracing to Visualize Network Communication Background / Scenario In this Packet Tracer (PT) activity, you will setup a home network. You will connect …
8.1.4 Lab – Develop Cybersecurity Policies and Procedures (Answers) Introduction Information security policies provide a framework for organizations to manage and protect their assets, and a safeguard that the organizations employ to reduce risk. Students will be required to compare information security policies to determine the differences between …
7.3.4 Lab – Risk Analysis (Answers) Objectives Part 1: Use Risk Analysis Methods Part 2: Calculate Risks Background / Scenario A risk analysis determines possible vulnerabilities and threats, their likelihood and consequences, and the tolerances for such events. The results of this process may be expressed by using …
7.2.2 Lab – Risk Management (Answers) Introduction An organization’s process of identifying and assessing risk is a continuous effort because types of threats change and they never completely disappear. The goal of risk management is to reduce these threats to an acceptable level. There are different levels of …
6.1.6 Lab – Gather System Information After an Incident (Answers) Objectives Collect system information after an incident has occurred. View logs for potential intrusions. Background / Scenario When an incident occurs in an organization, people responsible must know how to respond. An organization needs to develop an incident …