Professional Documents
Culture Documents
A group of environmentalists launch a denial of service attack against an oil company that is responsible for a large oil spill.
A teenager breaks into the web server of a local newspaper and posts a picture of a favorite cartoon character.
Criminals use the Internet to attempt to steal money from a banking company.
DDoS
Stuxnet
SQL injection
False or true
A computer teacher posted a photo on a social media site. Later, the teacher decided
to close the account on the social media site. The teacher deleted all the content
posted on the site including media and links. The teacher then canceled the account.
The photo is now no longer accessible on the internet.
False
True
Traditionally, network personnel have the mindset of protecting the network border.
What changes may be necessary when software as a service (SaaS) is used?
Manipulated data must be static
Security policies may need to be different if the data travels through the cloud
Social network site access time is greatly degraded due to the amount of processing
required for the SaaS application being in the cloud
A virus focuses on gaining privileged access to a device whereas a worm does not
A virus can be used to deliver advertisements without user consent whereas a worm cannot
A virus can be used to launch a DoS attack (but not a DDoS), but a worm can be
used to launch both DoS and DDoS attacks
ftp://download.openproject.net/
https://www.ourblogs.info/
http://www.secureaccess.com:8080/
Which three features of data is cybersecurity primarily concerned with?
confidentiality
integrity
manageability
availability
What device passively monitors network traffic for anomalies that can indicate an
attack?
IDS
switch
Bridge
Web proxy
What is cybersecurity?
The use of satellites to spy on malicious user
What technology can be used to secure data as it travels across the public Internet?
VPN
WPA
CSMA/CD
WEP
What is the purpose of a broadcast address?
To identify all hosts within a collision domain
Which two types of applications rely on their traffic having priority over other traffic
types through the network? (Choose two)
File transfer
Instant messaging
Video
Voice
to select the paths that are used to direct traffic to destination networks
Which two components are necessary for a wireless client to be installed on a WLAN?
(Choose two)
Wireless NIC
Wireless bridge
Custom adapter
What two default wireless router settings can affect network security? (Choose two)
The SSID is broadcast
Which network device makes forwarding decisions based on the destination MAC
address that is contained in the frame?
Hub
Repeater
Router
Switch
Match the network trend to the corresponding description. (Not all
options are used.)
APIPA
FTP
DHCP
Application
Network
Data link