You are on page 1of 10

26/11/2020 Introduction to Cybersecurity v2 EOC Assessment - Final Exam Answers

 Questions Bank IOS Commands Help Resources » IP Subnet Calculators »

 Donations

InCountry
Search the site 

incountry.com
Atinja uma das certificaç
reconhecidas em Segura
Data Residency-as-a-
Service
Learn about Chinese
data protection laws
that regulate data
localization
processes
 CCNA v6 »  CCNA v7 » IT Essentials 7.0 » CCNA Security v2.0 » CCNA CyberOps »

CCNP » Linux »

OPEN
 Questions Bank CCNA v6 » CCNA v7 » IT Essentials 7.0 » CCNA Security v2.0 »

CCNA CyberOps » CCNP » Linux » IOS Commands Help Resources »

Download Cisco Packet Tracer » IP Subnet Calculators » Donation Contact

Introduction to Cybersecurity v2 EOC


Assessment – Final Exam Answers
 17/02/2019 |  Last Updated on 17/02/2019 |
 Introduction to Cybersecurity |  No Comments

CISM - ISACA Formação e Exame


Prepare-se para o exame em todos os domínios do CISM.
Exercícios por domínio.
Share your Buy me a

Donate
api.elasticemail.com ABRIR

 Share  Tweet  Share  Pin it

1. Which statement describes cybersecurity? 


It is a framework for security policy development.
https://itexamanswers.net/introduction-to-cybersecurity-v2-eoc-assessment-final-exam-answers.html 1/10
26/11/2020 Introduction to Cybersecurity v2 EOC Assessment - Final Exam Answers

It is a standard-based model for developing firewall


technologies to fight against cybercriminals.
It is the name of a comprehensive security application for
end users to protect workstations from being attacked.
It is an ongoing effort to protect Internet-connected
systems and the data associated with those systems InCountry
from unauthorized use or harm. incountry.com

Cybersecurity is the ongoing effort to protect Internet- Data Residency-as-a-


connected network systems and all of the data associated Service
with the systems from unauthorized use or harm.
Learn about Chinese
CCNA v7.0protection
data Exam Answers
laws
2. What are two objectives of ensuring data integrity?
(Choose two.) that regulate
CCNA 1 – v7
data
CCNA 2 – v7
Data is available all the time. localization
Data is unaltered during transit. processes
CCNA 3 – v7

Access to the data is authenticated.


Data is not changed by unauthorized entities. Modules 1 – 3: Basic
Data is encrypted while in transit and when stored on Network Connectivity and
disks. Communications Exam
Answers OPEN
The objectives for data integrity include data not being
Modules 4 – 7: Ethernet
altered during transit and not being changed by
Concepts Exam Answers
unauthorized entities. Authentication and encryption are
methods to ensure confidentiality. Data being available all Modules 8 – 10:
the time is the goal of availability. Communicating Between
Networks Exam Answers

3. A web server administrator is configuring access Modules 11 – 13: IP


settings to require users to authenticate first before Addressing Exam Answers
accessing certain web pages. Which requirement of
information security is addressed through the Modules 14 – 15: Network
configuration? Application Communications
integrity Exam Answers
scalability
Modules 16 – 17: Building
availability
and Securing a Small
confidentiality
Network Exam Answers

Confidentiality ensures that data is accessed only by [PT Skills] Practice PT


authorized individuals. Authentication will help verify the Skills Assessment (PTSA)
identity of the individuals.
[Hands on Skills] CCNAv7
ITN Skills Assessment
4. A company is experiencing overwhelming visits to a
main web server. The IT department is developing a plan to ITNv7 Practice Final Exam

add a couple more web servers for load balancing and CCNA 1 v7 FINAL Exam
redundancy. Which requirement of information security is Answers
addressed by implementing the plan?
integrity 

https://itexamanswers.net/introduction-to-cybersecurity-v2-eoc-assessment-final-exam-answers.html 2/10
26/11/2020 Introduction to Cybersecurity v2 EOC Assessment - Final Exam Answers

scalability
availability CCNA v5 + v6.0 Exam
confidentiality
Answers

Availability ensures that network services are accessible


and performing well under all conditions. By load balancing
InCountry
CCNA 1 CCNA 2 CCNA 3

CCNAincountry.com
4
the traffic destined to the main web servers, in times of a
huge volume of visits the systems will be well managed
and serviced. CCNA 1 – Pretest
Data Residency-as-a-
CCNA 1 – Chapter 1
Service
CCNA 1 – Chapter 2
5. An employee does something as a company
Learn
CCNA about
1 – Chapter 3 Chinese
representative with the knowledge of that company and CCNA 1 – Chapter 4
this action is deemed illegal. The company would be legally
data protection laws
CCNA 1 – Chapter 5
responsible for this action. that regulate data
CCNA 1 – Chapter 6
True or False? localization
CCNA 1 – Chapter 6 Skills PT
True
processes
CCNA 1 – Chapter 7
False CCNA 1 – Chapter 8
CCNA 1 – Chapter 9
CCNA 1 – Chapter 10
This is a bit of a grey area and would also depend on local CCNA 1 – Chapter 11
laws. In many cases, if the employee did something with CCNA 1 PT Practice Skills
OPEN
the knowledge or approval of the company, then the legal CCNA 1 – Practice Final
responsibility would probably be with the company not the CCNA 1 – Final Exam
employee. In some areas or situations, both the company
and employee could be held legally responsible.

6. What is the main purpose of cyberwarfare? Recent Comments


to protect cloud-based data centers CCNA Questions Answers on
to gain advantage over adversaries CCNA 200-301 Dumps Full
to develop advanced network devices Questions – Exam Study Guide &
to simulate possible war scenarios among nations Free
Aiden on CCNA 200-301 Dumps
Full Questions – Exam Study Guide
Cyberwarfare is Internet-based conflict that involves the & Free
penetration of the networks and computer systems of other
Cody7172 on CCNA 200-301
nations. The main purpose of cyberwarfare is to gain Dumps Full Questions – Exam
advantage over adversaries, whether they are nations or Study Guide & Free
competitors.
jimmy on CCNA 200-301 Dumps
Full Questions – Exam Study Guide
7. When describing malware, what is a difference between a & Free
virus and a worm? Sanjeev on CCIE/CCNP 350-401
ENCOR Dumps Full Questions with
VCE & PDF

[Cert] CCNA 200-301 Exam

https://itexamanswers.net/introduction-to-cybersecurity-v2-eoc-assessment-final-exam-answers.html 3/10
26/11/2020 Introduction to Cybersecurity v2 EOC Assessment - Final Exam Answers

InCountry
incountry.com

Data Residency-as-a-
Service
A virus focuses on gaining privileged access to a device,
whereas a worm does not. Learn about Chinese
A virus can be used to deliver advertisements without user data protection laws
consent, whereas a worm cannot.
that regulate data
A virus replicates itself by attaching to another file,
whereas a worm can replicate itself independently.
localization
A virus can be used to launch a DoS attack (but not a processes
DDoS), but a worm can be used to launch both DoS and
DDoS attacks.

Malware can be classified as follows:


– Virus (self replicates by attaching to another program or OPEN
file)
– Worm (replicates independently of another program)
– Trojan Horse (masquerades as a legitimate file or
program)
– Rootkit (gains privileged access to a machine while
concealing itself)
– Spyware (collects information from a target system)
– Adware (delivers advertisements with or without consent)
– Bot (waits for commands from the hacker)
– Ransomware (holds a computer system or data captive
until payment is received)

8. What type of attack uses zombies?

https://itexamanswers.net/introduction-to-cybersecurity-v2-eoc-assessment-final-exam-answers.html 4/10
26/11/2020 Introduction to Cybersecurity v2 EOC Assessment - Final Exam Answers

Trojan horse
DDoS
SEO poisoning
spear phishing

The hacker infects multiple machines (zombies), creating a


InCountry
incountry.com
botnet. Zombies launch the distributed denial of service
(DDoS) attack.
Data Residency-as-a-
9. The IT department is reporting that a company web Service
server is receiving an abnormally high number of web page
Learn about Chinese
requests from different locations simultaneously. Which
type of security attack is occurring?
data protection laws
adware that regulate data
DDoS localization
phishing processes
social engineering
spyware

Phishing, spyware, and social engineering are security


attacks that collect network and user information. Adware OPEN
consists, typically, of annoying popup windows. Unlike a
DDoS attack, none of these attacks generate large
amounts of data traffic that can restrict access to network
services.

10. What is the best approach to prevent a compromised


IoT device from maliciously accessing data and devices on
a local network?

Install a software firewall on every network device.


https://itexamanswers.net/introduction-to-cybersecurity-v2-eoc-assessment-final-exam-answers.html 5/10
26/11/2020 Introduction to Cybersecurity v2 EOC Assessment - Final Exam Answers

Place all IoT devices that have access to the Internet


on an isolated network.
Disconnect all IoT devices from the Internet.
Set the security settings of workstation web browsers to a
higher level.
InCountry
incountry.com
The best approach to protect a data network from a
possibly compromised IoT device is to place all IoT devices
on an isolated network that only has access to the Internet. Data Residency-as-a-
Service
11. What is the best method to avoid getting spyware on a
Learn about Chinese
machine?
Install the latest operating system updates.
data protection laws
Install the latest web browser updates. that regulate data
Install the latest antivirus updates. localization
Install software only from trusted websites. processes

The best method to avoid getting spyware on a user


machine is to download software only from trusted
websites.
OPEN
12. What are two security implementations that use
biometrics? (Choose two.)

voice recognition
fob
phone
fingerprint
credit card

Biometric authentication can be used through the use of a


fingerprint, palm print, and facial or voice recognition.

13. Which technology creates a security token that allows a



user to log in to a desired web application using

https://itexamanswers.net/introduction-to-cybersecurity-v2-eoc-assessment-final-exam-answers.html 6/10
26/11/2020 Introduction to Cybersecurity v2 EOC Assessment - Final Exam Answers

credentials from a social media website?


password manager
Open Authorization
in-private browsing mode
VPN service
InCountry
incountry.com
Open Authorization is an open standard protocol that
allows end users to access third party applications without
exposing their user passwords. Data Residency-as-a-
Service
14. A medical office employee sends emails to patients
Learn about Chinese
about recent patient visits to the facility. What information
would put the privacy of the patients at risk if it was
data protection laws
included in the email? that regulate data
patient records localization
first and last name processes
contact information
next appointment

An email message is transmitted in plain text and can be


read by anyone who has access to the data while it is en OPEN
route to a destination. Patient records include confidential
or sensitive information that should be transmitted in a
secure manner.

15. Which two tools used for incident detection can be


used to detect anomalous behavior, to detect command
and control traffic, and to detect infected hosts? (Choose
two.)
intrusion detection system
Honeypot
NetFlow
Nmap
a reverse proxy server

Although each of these tools is useful for securing


networks and detecting vulnerabilities, only an IDS and
NetFlow logging can be used to detect anomalous
behavior, command and control traffic, and infected hosts.

16. For what purpose would a network administrator use


the Nmap tool?
detection and identification of open ports
protection of the private IP addresses of internal hosts
identification of specific network anomalies
collection and analysis of security alerts and logs

https://itexamanswers.net/introduction-to-cybersecurity-v2-eoc-assessment-final-exam-answers.html 7/10
26/11/2020 Introduction to Cybersecurity v2 EOC Assessment - Final Exam Answers

Nmap allows an administrator to perform port scanning to


probe computers and the network for open ports. This
helps the administrator verify that network security policies

InCountry
are in place.

17. Which stage of the kill chain used by attackers focuses incountry.com
on the identification and selection of targets?
delivery Data Residency-as-a-
exploitation
Service
weaponization
reconnaissance Learn about Chinese
data protection laws
It is the first stage, reconnaissance, of the the kill chain that that regulate data
focuses on the identification and selection of targets. localization
processes
18. What is an example of the a Cyber Kill Chain?
a group of botnets
a planned process of cyberattack
a series of worms based on the same core code
a combination of virus, worm, and Trojan Horse OPEN

The Cyber Kill Chain describes the phases of a progressive


cyberattack operation. The phases include the following:
Reconhecimento
Armamento
Entrega
Exploração
Instalação
Comando e controle
Ações sobre os objetivos
Em geral, essas fases são realizadas em sequência. No
entanto, durante um ataque, várias fases podem ser
realizadas simultaneamente, especialmente se vários
atacantes ou grupos estiverem envolvidos.

19. Qual ferramenta é usada para atrair um invasor para


que um administrador possa capturar, registrar e analisar o
comportamento do ataque?
Netflow
IDS
Nmap
pote de mel

Um honeypot é uma ferramenta configurada por um


administrador para atrair um invasor para que o
comportamento do invasor possa ser analisado. Essas 

https://itexamanswers.net/introduction-to-cybersecurity-v2-eoc-assessment-final-exam-answers.html 8/10
26/11/2020 Introduction to Cybersecurity v2 EOC Assessment - Final Exam Answers

informações podem ajudar o administrador a identificar


pontos fracos e construir uma defesa mais forte.

20. Qual é a principal função da Equipe de resposta a


incidentes de segurança da Cisco? InCountry
incountry.com

Data Residency-as-a-
Service
Learn about Chinese
data protection laws
that regulate data
localization
processes
para projetar malware polimórfico
para projetar roteadores e switches de última geração que
são menos propensos a ataques cibernéticos
para fornecer padrões para novas técnicas de criptografia
para garantir a preservação da empresa, do sistema e OPEN
dos dados

O tempo entre um ataque cibernético e o tempo que leva


para descobrir o ataque é o momento em que os hackers
podem entrar em uma rede e roubar dados. Uma meta
importante do CSIRT é garantir a preservação da
empresa, do sistema e dos dados por meio de
investigações oportunas sobre incidentes de segurança.

21. Que ação um IDS tomará ao detectar tráfego malicioso?


bloquear ou negar todo o tráfego
descarte apenas pacotes identificados como maliciosos
criar um alerta de rede e registrar a detecção
redirecionar o tráfego malicioso para um honeypot

Um IDS, ou sistema de detecção de intrusão, é um


dispositivo que pode escanear pacotes e compará-los a
um conjunto de regras ou assinaturas de ataque. Se os
pacotes corresponderem às assinaturas de ataque, o IDS
pode criar um alerta e registrar a detecção.

Artigos relacionados 

https://itexamanswers.net/introduction-to-cybersecurity-v2-eoc-assessment-final-exam-answers.html 9/10
26/11/2020 Introduction to Cybersecurity v2 EOC Assessment - Final Exam Answers

Cisco Equipment CCNA Security v2.0 InCountry - Data


InCountry
IT Essentials 7.0
from TFI Exam Answers - Residency-as-a- Practice Final
incountry.com
Labs Guide, Test… Service Exam (Chapters…

Ad TFI itexamanswers.net Ad incountry.com Data Residency-as-a-


itexamanswers.net

Service
Learn about Chinese
data protection laws
that regulate data
Free Writing Hands On Skills CCNA 1 v7 Exam CCNA Cyber Ops
localization
Assistant Exam - CCNAv7 ITN Answers - (Version 1.1) -
Skills… Introduction to… processes
Chapter 1 Exam…

Ad Grammarly itexamanswers.net itexamanswers.net itexamanswers.net

OPEN

Conectar com   

Join the discussion

{} 

0 COMMENTS

ITExamAnswers.net Copyright © 2020. Privacy Policy | Contact

https://itexamanswers.net/introduction-to-cybersecurity-v2-eoc-assessment-final-exam-answers.html 10/10

You might also like