You are on page 1of 18

CYBS 6200 MID TERM EXAM

50/50

Question 1
Answer saved
Marked out of 1.00

Flag question

Question text
Turning off your network devices, it minimizes the chances of becoming a target for hackers.

Select one:

a.
Surge protection

b.
Noise reduction

c.
Security reasons

Question 2
Answer saved
Marked out of 1.00

Flag question

Question text
Hacking refers to activities that seek to compromise digital devices, such as computers, smartphones, tablets, and even entire
networks.

Select one:

True

False

Question 3
Answer saved
Marked out of 1.00

Flag question

Question text
Make sure to protect your devices using limited security layers consisting of specialized security software such as updated antivirus
programs and traffic filtering software.

Select one:
CYBS 6200 MID TERM EXAM
50/50

True

False

Question 4
Answer saved
Marked out of 1.00

Flag question

Question text
New NIST guidelines includes no knowledge-based authentication, such as information from shared secret questions, marketing
data, transaction history.

Select one:

True

False

Question 5
Answer saved
Marked out of 1.00

Flag question

Question text
He/she breaks into computer systems without authority with a view to identify weaknesses and reveal them to the system owner.

Select one:

a.
a.White hat

b.
Grey hat

c.
Black hat

Question 6
Answer saved
Marked out of 1.00

Flag question

Question text
CYBS 6200 MID TERM EXAM
50/50
A Cracker is a person who finds and exploits the weakness in computer systems and/or networks to gain access.

Select one:

True

False

Question 7
Answer saved
Marked out of 1.00

Flag question

Question text
Google hacking
A Answer is a valuable resource for security researchers. Google hacking

Question 8
Answer saved
Marked out of 1.00

Flag question

Question text
This engine gives you enormous access to the URL information. It is the front-end of the Internet Archive of open web pages.

Wayback machine
Answer:

Question 9
Answer saved
Marked out of 1.00

Flag question

Question text
USB sticks are an excellent vehicle for infecting countless PCs and laptops.

Select one:

True

False

Question 10
CYBS 6200 MID TERM EXAM
50/50
Answer saved
Marked out of 1.00

Flag question

Question text
Gaining Access is the phase where the immature hacking takes place.

Select one:

True

False

Question 11
Answer saved
Marked out of 1.00

Flag question

Question text
A hacker who gains unauthorized access to computer systems for personal gain.

Select one:

a.
White hat

b.
Black hat

c.
Grey hat

Question 12
Answer saved
Marked out of 1.00

Flag question

Question text
A hacker who use hacking to send social, religious, and political, etmessages.

Select one:

a.
Script kiddies

b.
CYBS 6200 MID TERM EXAM
50/50
Phreaker

c.
Hacktivist

Question 13
Answer saved
Marked out of 1.00

Flag question

Question text
Encryption is the process of converting the information into a form where an unauthorized party cannot read it.

Select one:

True

False

Question 14
Answer saved
Marked out of 1.00

Flag question

Question text
It uses radioelectronic and cryptographic to degrade communication, thus war in the realm of communications.

Select one:

a.
Electronic warfare

b.
Intelligence-based warfare

c.
Command and Control warfare

Question 15
Answer saved
Marked out of 1.00

Flag question

Question text
Scanning this step will take the findings from footprinting and begin to drill-down a bit further.
CYBS 6200 MID TERM EXAM
50/50
Select one:

True

False

Question 16
Answer saved
Marked out of 1.00

Flag question

Question text
Encrypted data can only be read with the secret key or password.

Select one:

True

False

Question 17
Answer saved
Marked out of 1.00

Flag question

Question text
WPA stands for Wi-Fi Protected Access.

Select one:

True

False

Question 18
Answer saved
Marked out of 1.00

Flag question

Question text
The first thing you should do is to change the name of your Wi-Fi network.

Select one:

True
CYBS 6200 MID TERM EXAM
50/50

False

Question 19
Answer saved
Marked out of 1.00

Flag question

Question text
Information Warfare is described as “a struggle over the information and communications process”

Select one:

True

False

Question 20
Answer saved
Marked out of 1.00

Flag question

Question text
Unlike Google, this search engine does not track your activities, which is the first good thing about it.

DuckDuckGo
Answer:

Question 21
Answer saved
Marked out of 1.00

Flag question

Question text
Basicly looks for anything after the : in the site urls.

INURL
Answer:

Question 22
Answer saved
Marked out of 1.00
CYBS 6200 MID TERM EXAM
50/50

Flag question

Question text
Maintaning Access once a hacker has gained access, they want to keep that access for future exploitation and attacks.

Select one:

True

False

Question 23
Answer saved
Marked out of 1.00

Flag question

Question text
Another Google search engine, but quite different from its prime engine.

Google Scholar
Answer:

Question 24
Answer saved
Marked out of 1.00

Flag question

Question text
A military strategy that applies information warfare on the battlefield in order to separate the command structure of the opponents’
from the units they command.

Select one:

a.
Intelligence-based warfare

b.
Command and Control warfare

c.
Electronic warfare

Question 25
Answer saved
Marked out of 1.00
CYBS 6200 MID TERM EXAM
50/50

Flag question

Question text
Intitle
You can use the Answer to find anything in the title of the website. Which also could be usefull to find downloads or
anything else.

Question 26
Answer saved
Marked out of 1.00

Flag question

Question text
Although the modern home networks are much quieter these days, disabling your wireless home network can add calmness to your
home.

Select one:

a.
Noise reduction

b.
Security reasons

c.
Surge protection

Question 27
Answer saved
Marked out of 1.00

Flag question

Question text
WPA2 stands for Wi-Fi Protection Activated 2.

Select one:

True

False

Question 28
Answer saved
Marked out of 1.00
CYBS 6200 MID TERM EXAM
50/50

Flag question

Question text
Yippy
Answer in fact a Metasearch Engine (it gets its outcomes by utilizing other web indexes).

Question 29
Answer saved
Marked out of 1.00

Flag question

Question text
A hacker who gains access to systems with a view to fix the identified weaknesses.

Select one:

a.
Grey hat

b.
White hat

c.
Black hat

Question 30
Answer saved
Marked out of 1.00

Flag question

Question text
This is one of the search engines that will help you dig deep and get the results which may be missing on Google and Bing.

Pipl
Answer:

Question 31
Answer saved
Marked out of 1.00
CYBS 6200 MID TERM EXAM
50/50

Flag question

Question text
Published by the ShadowBroker hacker group, WannaCry tried to infect non-patched PCs.

Select one:

True

False

Question 32
Answer saved
Marked out of 1.00

Flag question

Question text
Reconnaissance is information Gathering and getting to know the target systems is the first process in ethical hacking.

Select one:

True

False

Question 33
Answer saved
Marked out of 1.00

Flag question

Question text
It refers to the use of technology to launch attacks on nations, governments and citizens, causing comparable harm to actual
warfare using weaponry.

Select one:

a.
Cyber warfare

b.
Hacker Warfare

c.
Psychological warfare

d.
CYBS 6200 MID TERM EXAM
50/50
Economic Warfare

Question 34
Answer saved
Marked out of 1.00

Flag question

Question text
A hacker who identifies and exploits weaknesses in telephones instead of computer

Select one:

a.
Hacktivist

b.
Script kiddies

c.
Phreaker

Question 35
Answer saved
Marked out of 1.00

Flag question

Question text
Deleting Your Data permanently means destroying the storage device to ensure that the data is unrecoverable.

Select one:

True

False

Question 36
Answer saved
Marked out of 1.00

Flag question

Question text
It involves the use of computer technology to electronically shut down, degrade, corrupt, or destroy an enemy’s information systems.

Select one:
CYBS 6200 MID TERM EXAM
50/50

a.
Hacker Warfare

b.
Economic Warfare

c.
Psychological warfare

d.
Cyber warfare

Question 37
Answer saved
Marked out of 1.00

Flag question

Question text
These are Local Backup except for;

Select one:

a.
thumb drives

b.
external hard drive

c.
Email account

d.
CDs/DVDs

Question 38
Answer saved
Marked out of 1.00

Flag question

Question text
Back up Your Data Prevent the loss of replaceable data.

Select one:

True

False

Question 39
Answer saved
CYBS 6200 MID TERM EXAM
50/50
Marked out of 1.00

Flag question

Question text
Make sure you set a strong and unique password to secure your wireless network.

Select one:

True

False

Question 40
Answer saved
Marked out of 1.00

Flag question

Question text
Intext
You can find literally everything using Answer you could even use the inurl dorks whit this.

Question 41
Answer saved
Marked out of 1.00

Flag question

Question text
It is sensor based - unlike other IW, which directly corrupt technological systems, intelligence-based warfare is regarded as the
"steel to target" IW.

Select one:

a.
Command and Control warfare

b.
Electronic warfare

c.
Intelligence-based warfare

Question 42
Answer saved
Marked out of 1.00
CYBS 6200 MID TERM EXAM
50/50

Flag question

Question text
It encompasses the use of information against the human mind (rather than against computer support).

Select one:

a.
Cyber warfare

b.
Economic Warfare

c.
Hacker Warfare

d.
Psychological warfare

Question 43
Answer saved
Marked out of 1.00

Flag question

Question text
A subscription-based search engine. It has a bunch of features apart from contemporary search habits.

SurfWax
Answer:

Question 44
Answer saved
Marked out of 1.00

Flag question

Question text
The router is best place in which part of the house?

Select one:

a.
Kitchen

b.
Bedroom
CYBS 6200 MID TERM EXAM
50/50

c.
Middle of the house

d.
Living Room

Question 45
Answer saved
Marked out of 1.00

Flag question

Question text
Turn off the wireless home network when you’re not at home.

Select one:

True

False

Question 46
Answer saved
Marked out of 1.00

Flag question

Question text
A non-skilled person who gains access to computer systems using already made tools.

Select one:

a.
Phreaker

b.
Script kiddies

c.
Hacktivist

Question 47
Answer saved
Marked out of 1.00

Flag question
CYBS 6200 MID TERM EXAM
50/50
Question text
Increase your Wi-Fi security by deactivating network encryption.

Select one:

True

False

Question 48
Answer saved
Marked out of 1.00

Flag question

Question text
The effectiveness of an information blockade presumes an era in which the well-being of societies will be as affected by information
flows as they are today by flows of material supplies.

Select one:

a.
Psychological warfare

b.
Hacker Warfare

c.
Cyber warfare

d.
Economic Warfare

Question 49
Answer saved
Marked out of 1.00

Flag question

Question text
WEP stands for Wired Equivalent Policy.

Select one:

True

False

Question 50
Answer saved
Marked out of 1.00
CYBS 6200 MID TERM EXAM
50/50

Flag question

Question text
When you power off your network device, you also lower the possibility of being damaged by electric power surges.

Select one:

a.
Surge protection

b.
Security reasons

c.
Noise reduction

You might also like