100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CCST - Cybersecurity Questions and Answers 2024

Rating
-
Sold
-
Pages
20
Grade
A+
Uploaded on
17-09-2024
Written in
2024/2025

CCST - Cybersecurity

Institution
Cyber Security
Course
Cyber security










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Cyber security
Course
Cyber security

Document information

Uploaded on
September 17, 2024
Number of pages
20
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Content preview

CCST - Cybersecurity

The responsibilities for a Junior Security Analyst are: - answer1- Preparation and
Prevention.
2- Monitoring and Investigation.
3- Response.

The Security Operations Center (SOC) Three-Tier Model: - answer Tire 1: Junior
Security Analyst - Triage Specialist
Tire 2: Security Operations Analyst - Incident Responder
Tire 3: Security Operations Analyst - Threat Hunter.

What is hardening? - answer The process of securing a system by reducing
vulnerabilities, removing unnecessary services, implementing security controls, and
following best practices to minimize the attack surface.

Defense-in-Depth/Layered Security - answer An approach that involves deploying
multiple layers of security controls and measures to protect systems and data. If one
layer is compromised, other layers can still provide protection.

What is a denial-of-service (DoS) attack? - answerAttacks aimed at rendering a
network, system, or service unavailable by overwhelming it with a flood of illegitimate
requests or excessive traffic.

What is a botnet? - answerNetworks of compromised computers controlled by a central
attacker, typically used for launching coordinated attacks, distributing spam, or
conducting DDoS attacks.

What is a man-in-the-middle (MitM) attack? - answerAttacks where an attacker
intercepts and alters communication between two parties without their knowledge. This
allows the attacker to eavesdrop, modify, or steal information.

Why does IoT technology pose a greater risk than other computing technology on a
network? - answerInternet of Things devices often lack robust security measures,
making them susceptible to attacks. Vulnerabilities in IoT devices can lead to
unauthorized access, data breaches, or control manipulation.

Which tool is used to provide a list of open ports on network devices? -
answerNmap/Zenmap

What is the most common goal of search engine optimization (SEO) poisoning? -
answerto increase web traffic to malicious sites

,A user is surfing the Internet using a laptop at a public WiFi cafe. What should be
checked first when the user connects to the public network? - answerif the laptop
requires user authentication for file and media sharing

Which protocol is used by the Cisco Cyberthreat Defense Solution to collect information
about the traffic that is traversing the network? - answerNetFlow

Any device that controls or filters traffic going in or out of the network is known as a
___________. - answerFirewall

Which tool can perform real-time traffic and port analysis, and can also detect port
scans, fingerprinting and buffer overflow attacks? - answerSnort

What is the best approach to prevent a compromised IoT device from maliciously
accessing data and devices on a local network? - answerPlace all IoT devices that have
access to the Internet on an isolated network.

What is that main function of the Cisco Security Incident Response Team? - answerTo
ensure company, system, and data preservation

Which technology creates a security token that allows a user to log in to a desired web
application using credentials from a social media website? - answerOpen Authentication

Which stage of the kill chain used by attackers focuses on the identification and
selection of targets? - answerReconnaissance

For what purpose would a network administrator use the Nmap tool? - answerDetection
and identification of open ports

What is the Nmap utility used for? - answerIt is an open source tool for scanning
vulnerabilities of systems and networks. It can identify open ports on a host.

What type of attack uses zombies? - answerDDoS

A medical office employee sends emails to patients about recent patient visits to the
facility. What information would put the privacy of the patients at risk if it was included in
the email? - answerPatient Records

Which two tools used for incident detection can be used to detect anomalous behavior,
to detect command and control traffic, and to detect infected hosts? - answerIntrusion
Detection System
and
NetFlow

, What is the IoT (internet of things) - answerThe connection of a broad array of physical
devices to the internet, enabling data collection and management via software.
Can include: Sensors and equipment

What is IMPACT? - answerThe international multilateral partnership against cyber
threats --
a global partnership of world governments, industries, and academia dedicated to
improving global capabilities when dealing with cyber threats.

What is meant by the term "Sniffing"? - answerWhen an attacker listens and captures
packets sent on neatwork at attempt to discover password

What is the Gramm-Leach-Bliley Act (GLBA)? - answer

What is the Sarbanes-Oxley Act? - answer

What is PCI DSS? - answer

What is the Electronic Communications Privacy Act (ECPA)? - answerAims to ensure
work place privacy and protects a range of electronic communications, such as email
and telephone conversation, from unauthorized interception, access, use, and
disclosure

What is the Computer Fraud and Abuse Act (CFAA) of 1986? - answerProhibits the
unauthorized access of computer systems. Knowingly accessing a government
computer without permission or accessing any computer used in or affecting interstate
or foreign commerce is a criminal offense.

The Privacy Act of 1974: - answer

The Freedom of Information Act (FOIA): - answer

What is FERPA (Family Education Rights and Privacy Act of 1974)? - answer

What is COPPA? - answerThe Children's Online Privacy Protection Act (COPPA) is a
law created to protect the privacy of children under 13. The Act was passed by the U.S.
Congress in 1998 and took effect in April 2000. COPPA is managed by the Federal
Trade Commission (FTC).

What is CIPA? - answerThe Children's Internet Protection Act (CIPA) requires that K-12
schools and libraries in the United States use Internet filters and implement other
measures to protect children from harmful online content as a condition for federal
funding.

What is VPPA? - answer

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
julianah420 Phoenix University
View profile
Follow You need to be logged in order to follow users or courses
Sold
652
Member since
2 year
Number of followers
323
Documents
33731
Last sold
2 days ago
NURSING,TESTBANKS,ASSIGNMENT,AQA AND ALL REVISION MATERIALS

On this page, you find all documents, package deals, and flashcards offered by seller julianah420

4.3

147 reviews

5
101
4
20
3
7
2
5
1
14

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions