You are on page 1of 8

10/2/2019 Quiz: Final Quiz

Final Quiz
Started: Feb 10 at 9:05pm

Quiz Instrucons
This quiz covers all of the content in Cybersecurity Essentials 1.1. It is designed to test the skills and
knowledge presented in the course.
There are multiple task types that may be available in this quiz.
NOTE: Quizzes allow for partial credit scoring on all item types to foster learning. Points on quizzes can
also be deducted for answering incorrectly.

Forms 32901 - 23908

Question 1 2 pts

Which statement best describes a motivation of hacktivists?

They are trying to show off their hacking skills.

They are curious and learning hacking skills.

They are part of a protest group behind a political cause.

They are interested in discovering new exploits.

Question 2 2 pts

What is an example of early warning systems that can be used to thwart cybercriminals?

Honeynet project

CVE database

Infragard

ISO/IEC 27000 program


10/2/2019 Quiz: Final Quiz

Which two groups of people are considered internal attackers? (Choose two.)

ex-employees

black hat hackers

trusted partners

amateurs

hacktivists

Question 4 2 pts

Which data state is maintained in NAS and SAN services?

data in-transit

stored data

encrypted data

data in-process

Question 5 2 pts

Which technology can be used to ensure data confidentiality?

hashing

identity management

RAID

encryption
10/2/2019 Quiz: Final Quiz

Which technology should be used to enforce the security policy that a computing device
must be checked against the latest antivirus update before the device is allowed to
connect to the campus network?

SAN

VPN

NAS

NAC

Question 7 2 pts

Which technology can be implemented as part of an authentication system to verify the


identification of employees?

a smart card reader 

SHA-1 hash

a virtual fingerprint

a Mantrap

Question 8 2 pts

What are three states of data during which data is vulnerable? (Choose three.)

data encrypted

data in-transit

purged data

stored data

data in-process

data decrypted
10/2/2019 Quiz: Final Quiz

Question 9 2 pts

What is an impersonation attack that takes advantage of a trusted relationship between


two systems?

man-in-the-middle

spamming

sniffing

spoofing

Question 10 2 pts

What three best practices can help defend against social engineering attacks? (Choose
three.)

Educate employees regarding policies.

 Add more security guards.

Resist the urge to click on enticing web links.

Enable a policy that states that the IT department should supply information over the phone only
to managers.

Do not provide password resets in a chat window.

Deploy well-designed firewall appliances.

Question 11 2 pts

What type of attack has an organization experienced when an employee installs an


unauthorized device on the network to view network traffic?

phishing
10/2/2019 Quiz: Final Quiz

sniffing

spamming

Question 12 2 pts

The employees in a company receive an email stating that the account password will
expire immediately and requires a password reset within 5 minutes. Which statement
would classify this email?

It is an impersonation attack.

It is a DDoS attack.

It is a hoax.

It is a piggy-back attack.

Question 13 2 pts

 An executive manager went to an important meeting. The secretary in the office receives
a call from a person claiming that the executive manager is about to give an important
presentation but the presentation files are corrupted. The caller sternly recommends that
the secretary email the presentation right away to a personal email address. The caller 
also states that the executive is holding the secretary responsible for the success of this
presentation. Which type of social engineering tactic would describe this scenario?

trusted partners

intimidation

urgency

familiarity

Question 14 2 pts
10/2/2019 Quiz: Final Quiz

What type of application attack occurs when data goes beyond the memory areas
allocated to the application?

RAM spoofing

RAM Injection

buffer overflow

SQL injection

Question 15 2 pts

Users report that the network access is slow. After questioning the employees, the
network administrator learned that one employee downloaded a third-party scanning
program for the printer. What type of malware might be introduced that causes slow
performance of the network?

virus

spam

phishing

worm

Question 16 2 pts

Passwords, passphrases, and PINs are examples of which security term?

authorization

access

authentication

identification
10/2/2019 Quiz: Final Quiz

WEP

WPA2

WEP2

WPA

Question 47 2 pts

Which two protocols pose switching threats? (Choose two.)

STP

IP

RIP

WPA2

 ARP

ICMP

Question 48 2 pts

HVAC, water system, and fire systems fall under which of the cybersecurity domains?

device

user 

physical facilities

network

Question 49 2 pts

You might also like