Sie sind auf Seite 1von 4

Numele si prenumele: 36 de întrebari a 0.25 puncte.

1 punct din oficiu

1) What type of attack uses many systems to flood the resources of a target, thus making the target unavailable?
a) DoS
b) spoof
c) DDoS
d) ping sweep
2) What does the term vulnerability mean?
a) a weakness that makes a target susceptible to an attack
b) a potential threat that a hacker creates
c) a method of attack to exploit a target
d) a known target or victim machine
e) a computer that contains sensitive information
3) Pick three types of records that cyber thieves would be interested in stealing from organizations. (Choose three.)
a) food
b) medical
c) flight
d) employment
e) rock
f) game
g) education
4) What principle prevents the disclosure of information to unauthorized people, resources, and processes?
a) accounting
b) availability
c) integrity
d) nonrepudiation
e) confidentiality
5) What are the three foundational principles of the cybersecurity world? (Choose three.)
a) security
b) integrity
c) confidentiality
d) availability
e) policy
f) encryption
6) What are two common hash functions? (Choose two.)
a) Blowfish
b) SHA
c) ECC
d) RC4
e) MD5
f) RSA
7) What is a secure virtual network called that uses the public network?
a) NAC
b) VPN
c) IDS
d) IPS
e) Firewall
f) MPLS
8) Which two methods help to ensure data integrity? (Choose two.)
a) hashing
b) privacy
c) data consistency checks
d) repudiation
e) availability
f) authorization
9) For the purpose of authentication, what three methods are used to verify identity? (Choose three.)
a) where you are
b) something you do
c) something you have
d) something you are
e) something you know
10) What service determines which resources a user can access along with the operations that a user can perform?
a) authorization
b) biometric
c) accounting
d) authentication
e) token
11) What are two methods that ensure confidentiality? (Choose two.)
a) integrity
b) availability
c) encryption
d) authentication
e) nonrepudiation
f) authorization
12) What two methods help to ensure system availability? (Choose two.)
a) up-to-date operating systems
b) equipment maintenance
c) system backups
d) fire extinguishers
e) integrity checking
f) system resiliency
13) What occurs on a computer when data goes beyond the limits of a buffer?
a) a buffer overflow
b) a system exception
c) cross-site scripting
d) an SQL injection
14) What is the term used when a malicious party sends a fraudulent email disguised as being from a legitimate,
trusted source?
a) phishing
b) vishing
c) Trojan
d) social engineering
e) backdoor
15) What is a vulnerability that allows criminals to inject scripts into web pages viewed by users?
a) Cross-site scripting
b) SQL injection
c) XML injection
d) buffer overflow
16) What type of attack targets an SQL database using the input field of a user?
a) Cross-site scripting
b) XML injection
c) SQL injection
d) buffer overflow
17) A computer is presenting a user with a screen requesting payment before the user data is allowed to be
accessed by the same user. What type of malware is this?
a) a type of virus
b) a type of worm
c) a type of ransomware
d) a type of logic bomb
18) What are two of the tactics used by a social engineer to obtain personal information from an unsuspecting
target? (Choose two.)
a) honesty
b) urgency
c) integrity
d) compassion
e) intimidation
19) What is the term used to describe an email that is targeting a specific person employed at a financial institution?
a) spyware
b) spam
c) target phishing
d) vishing
e) spear phishing
20) What are two ways to protect a computer from malware? (Choose two)
a) Keep software up to date.
b) Empty the browser cache.
c) Defragment the hard disk.
d) Use antivirus software.
e) Delete unused software.
21) What does a rootkit modify?
a) Notepad
b) screen savers
c) programs
d) operating system
e) Microsoft Word
22) What are three examples of administrative access controls? (Choose three.)
a) background checks
b) policies and procedures
c) guard dogs
d) intrusion detection system (IDS)
e) encryption
f) hiring practices
23) What is the name of the method in which letters are rearranged to create the ciphertext?
a) substitution
b) one-time pad
c) transposition
d) enigma
24) What cryptographic algorithm is used by the NSA and includes the use of elliptical curves for digital signature
generation and key exchange?
a) RSA
b) AES
c) ECC
d) IDEA
e) El-Gamal
25) What term is used to describe concealing data in another file such as a graphic, audio, or other text file?
a) hiding
b) steganography
c) masking
d) obfuscation
26) Which two terms are used to describe cipher keys? (Choose two.)
a) key length
b) key randomness
c) key space
d) keylogging
27) Which 128-bit block cipher encryption algorithm does the US government use to protect classified information?
a) AES
b) Caesar
c) Skipjack
d) 3DES
e) Vignere
28) What encryption algorithm uses the same pre-shared key to encrypt and decrypt data?
a) asymmetric
b) symmetric
c) one-time pad
d) hash
29) Which three processes are examples of logical access controls? (Choose three.)
a) guards to monitor security screens
b) firewalls to monitor traffic
c) fences to protect the perimeter of a building
d) intrusion detection system (IDS) to watch for suspicious network activity
e) swipe cards to allow access to a restricted area
f) biometrics to validate physical characteristics
30) Which three devices represent examples of physical access controls? (Choose three.)
a) servers
b) swipe cards
c) locks
d) routers
e) firewalls
f) video cameras
31) Which type of cipher is able to encrypt a fixed-length block of plaintext into a fixed-length block of ciphertext at
any one time?
a) stream
b) block
c) hash
d) transform
e) symmetric
32) What type of cipher encrypts plaintext one byte or one bit at a time?
a) elliptical
b) block
c) enigma
d) stream
e) hash
33) What encryption algorithm uses one key to encrypt data and a different key to decrypt data?
a) asymmetric
b) one-time pad
c) transposition
d) symmetric
34) Which three protocols use asymmetric key algorithms? (Choose three.)
a) Pretty Good Privacy (PGP)
b) Secure Sockets Layer (SSL)
c) Advanced Encryption Standard (AES)
d) Secure File Transfer Protocol (SFTP)
e) Secure Shell (SSH)
f) Telnet
35) What is the term used to describe the science of making and breaking secret codes?
a) jamming
b) cryptology
c) spoofing
d) impersonation
e) factorization
36) A user has created a new program and wants to distribute it to everyone in the company. The user wants to
ensure that when the program is downloaded that the program is not changed while in transit. What can the
user do to ensure that the program is not changed when downloaded?
a) Install the program on individual computers.
b) Encrypt the program and require a password after it is downloaded.
c) Distribute the program on a thumb drive.
d) Turn off antivirus on all the computers.
e) Create a hash of the program file that can be used to verify the integrity of the file after it is downloaded.

Das könnte Ihnen auch gefallen