You are on page 1of 6

Cybersecurity Pre-Test

CyberSecurity (Versión 1.1)

What is an example of "hacktivism"?


A country tries to steal defense secrets from another country by infiltrating government networks.

A group of environmentalists launch a denial of service attack against an oil company that is responsible for a large oil spill.

A teenager breaks into the web server of a local newspaper and posts a picture of a favorite cartoon character.

Criminals use the Internet to attempt to steal money from a banking company.

What was used as a cyberwarfare weapon to attack a uranium enrichment facility in


Iran?
PSYOPS

DDoS

Stuxnet

SQL injection

What is a concern when a company has a cloud-based? Infrastructure as part of its IT


infrastructure
The Company shares the security footprint with other companies

More downtime is possible as a result of the borderless infrastructure

Software as a service (SaaS) is not easy to implement

Email becomes more prone to attack

False or true
A computer teacher posted a photo on a social media site. Later, the teacher decided
to close the account on the social media site. The teacher deleted all the content
posted on the site including media and links. The teacher then canceled the account.
The photo is now no longer accessible on the internet.
False

True
Traditionally, network personnel have the mindset of protecting the network border.
What changes may be necessary when software as a service (SaaS) is used?
Manipulated data must be static

Email must be protected to a greater degree

Security policies may need to be different if the data travels through the cloud

Social network site access time is greatly degraded due to the amount of processing
required for the SaaS application being in the cloud

When describing malware, what is a difference between a virus and a worm?


A virus replicates itself by attaching to another file whereas a worm can replicate itself independently

A virus focuses on gaining privileged access to a device whereas a worm does not

A virus can be used to deliver advertisements without user consent whereas a worm cannot

A virus can be used to launch a DoS attack (but not a DDoS), but a worm can be
used to launch both DoS and DDoS attacks

Which website is considered secure because it encrypts the communication between


the website and visitors?
http://www.thebanks.com/

ftp://download.openproject.net/

https://www.ourblogs.info/

http://www.secureaccess.com:8080/
Which three features of data is cybersecurity primarily concerned with?
confidentiality

integrity

manageability

availability

What device passively monitors network traffic for anomalies that can indicate an
attack?
IDS

switch

Bridge

Web proxy

What is cybersecurity?
The use of satellites to spy on malicious user

Efforts to prevent people from becoming hackers

the act of securing the Internet

The protection of cyberspace

What technology can be used to secure data as it travels across the public Internet?
VPN

WPA

CSMA/CD

WEP
What is the purpose of a broadcast address?
To identify all hosts within a collision domain

To identify a specific group of hosts on a network

To identify all hosts within a specific network

To identify a single host

Which two types of applications rely on their traffic having priority over other traffic
types through the network? (Choose two)
File transfer

Instant messaging

Video

Voice

What is the purpose of the routing process?


to encapsulate data that is used to communicate across a network

to select the paths that are used to direct traffic to destination networks

to convert a URL name into an IP address

to provide secure Internet file transfer

Which two components are necessary for a wireless client to be installed on a WLAN?
(Choose two)
Wireless NIC

Wireless bridge

Wireless client software

Custom adapter

What two default wireless router settings can affect network security? (Choose two)
The SSID is broadcast

MAC address filtering is enabled

WEP encryption is enabled

A well-known administrator password is set


What is the purpose of the network security authentication function?
To require users to prove who they are

To determine which resources a user can access

To keep track of the actions of a user

To provide challenge and response questions

Match each description to its networks type.(Not all options


are used.)

Which network device makes forwarding decisions based on the destination MAC
address that is contained in the frame?
Hub

Repeater

Router

Switch
Match the network trend to the corresponding description. (Not all
options are used.)

Which network protocol is used to automatically assign an IP address to a computer


on a network?
SMTP

APIPA

FTP

DHCP

Which layer of the OSI model defines logical addressing?


Transport

Application

Network

Data link

You might also like