Professional Documents
Culture Documents
Final Quiz
Started: Feb 10 at 9:05pm
Quiz Instrucons
This quiz covers all of the content in Cybersecurity Essentials 1.1. It is designed to test the skills and
knowledge presented in the course.
There are multiple task types that may be available in this quiz.
NOTE: Quizzes allow for partial credit scoring on all item types to foster learning. Points on quizzes can
also be deducted for answering incorrectly.
Question 1 2 pts
Question 2 2 pts
What is an example of early warning systems that can be used to thwart cybercriminals?
Honeynet project
CVE database
Infragard
Which two groups of people are considered internal attackers? (Choose two.)
ex-employees
trusted partners
amateurs
hacktivists
Question 4 2 pts
data in-transit
stored data
encrypted data
data in-process
Question 5 2 pts
hashing
identity management
RAID
encryption
10/2/2019 Quiz: Final Quiz
Which technology should be used to enforce the security policy that a computing device
must be checked against the latest antivirus update before the device is allowed to
connect to the campus network?
SAN
VPN
NAS
NAC
Question 7 2 pts
SHA-1 hash
a virtual fingerprint
a Mantrap
Question 8 2 pts
What are three states of data during which data is vulnerable? (Choose three.)
data encrypted
data in-transit
purged data
stored data
data in-process
data decrypted
10/2/2019 Quiz: Final Quiz
Question 9 2 pts
man-in-the-middle
spamming
sniffing
spoofing
Question 10 2 pts
What three best practices can help defend against social engineering attacks? (Choose
three.)
Enable a policy that states that the IT department should supply information over the phone only
to managers.
Question 11 2 pts
phishing
10/2/2019 Quiz: Final Quiz
sniffing
spamming
Question 12 2 pts
The employees in a company receive an email stating that the account password will
expire immediately and requires a password reset within 5 minutes. Which statement
would classify this email?
It is an impersonation attack.
It is a DDoS attack.
It is a hoax.
It is a piggy-back attack.
Question 13 2 pts
An executive manager went to an important meeting. The secretary in the office receives
a call from a person claiming that the executive manager is about to give an important
presentation but the presentation files are corrupted. The caller sternly recommends that
the secretary email the presentation right away to a personal email address. The caller
also states that the executive is holding the secretary responsible for the success of this
presentation. Which type of social engineering tactic would describe this scenario?
trusted partners
intimidation
urgency
familiarity
Question 14 2 pts
10/2/2019 Quiz: Final Quiz
What type of application attack occurs when data goes beyond the memory areas
allocated to the application?
RAM spoofing
RAM Injection
buffer overflow
SQL injection
Question 15 2 pts
Users report that the network access is slow. After questioning the employees, the
network administrator learned that one employee downloaded a third-party scanning
program for the printer. What type of malware might be introduced that causes slow
performance of the network?
virus
spam
phishing
worm
Question 16 2 pts
authorization
access
authentication
identification
10/2/2019 Quiz: Final Quiz
WEP
WPA2
WEP2
WPA
Question 47 2 pts
STP
IP
RIP
WPA2
ARP
ICMP
Question 48 2 pts
HVAC, water system, and fire systems fall under which of the cybersecurity domains?
device
user
physical facilities
network
Question 49 2 pts