100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CYBERSECURITY ESSENTIALS FINAL QUIZ Questions and Answers Lates Updates 2024

Rating
-
Sold
-
Pages
20
Grade
A+
Uploaded on
23-06-2024
Written in
2023/2024

CYBERSECURITY ESSENTIALS FINAL QUIZ Questions and Answers Lates Updates 2024

Institution
Course










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Study
Course

Document information

Uploaded on
June 23, 2024
Number of pages
20
Written in
2023/2024
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CYBERSECURITY ESSENTIALS FINAL QUIZ
Questions and Answers Lates Updates 2024


Which statement best describes a motivation of hacktivists?
▪ They are trying to show off their hacking skills.
▪ They are interested in discovering new exploits.
▪ They are curious and learning hacking skills.
▪ They are part of a protest group behind a political cause.
Explanation: Each type of cybercriminal has a distinct motivation for his or her actions.
1. Which type of cybercriminal is the most likely to create malware to compromise an organization by
stealing credit card information?
▪ white hat hackers
▪ black hat hackers
▪ gray hat hackers
▪ script kiddies
Explanation: Malware is a tool used by certain types of hackers to steal information.
2. A specialist in the HR department is invited to promote the cybersecurity program in community
schools. Which three topics would the specialist emphasize in the presentation to draw students to this
field? (Choose three.)
▪ a career-field in high-demand
▪ service to the public
▪ high earning potential
▪ a job with routine, day-to-day tasks
▪ a field requiring a PhD degree
▪ the CompTIA A+ certification provides an adequate knowledge base for the field
Explanation: The increased demand for cybersecurity specialists offers several unique career
opportunities.
3. An organization allows employees to work from home two days a week. Which technology should
be implemented to ensure data confidentiality as data is transmitted?
▪ SHS
▪ VLANS
▪ RAID
▪ VPN
Explanation: Protecting data confidentiality requires an understanding of the technologies used to
protect data in all three data states.
4. Which type of networks poses increasing challenges to cybersecurity specialists due to the growth of
BYOD on campus?
▪ wireless networks
▪ wired networks

,▪ sneaker net
▪ virtual networks
Explanation: A cybersecurity specialist must be familiar with the types of technologies used to
store, transmit, and process data.
5. A cybersecurity specialist is working with the IT staff to establish an effective information security
plan. Which combination of security principles forms the foundation of a security plan?
▪ confidentiality, integrity, and availability
▪ technologies, policies, and awareness
▪ secrecy, identify, and nonrepudiation
▪ encryption, authentication, and identification
Explanation: The CIA Triad is the foundation upon which all information management systems are
developed.
6. Which framework should be recommended for establishing a comprehensive information security
management system in an organization?
▪ ISO/IEC 27000
▪ ISO OSI model
▪ NIST/NICE framework
▪ CIA Triad
Explanation: A cybersecurity specialist needs to be familiar with the different frameworks and
models for managing information security.
7. What are three states of data during which data is vulnerable? (Choose three.)
▪ data in-process
▪ stored data
▪ data in-transit
▪ data encrypted
▪ purged data
▪ data decrypted
Explanation: A cybersecurity specialist must be aware of each of the three states of data to
effectively protect data and information. Purged data was stored data. Encrypted and decrypted
data can be in any of the three states.
8. Users report that the database on the main server cannot be accessed. A database administrator
verifies the issue and notices that the database file is now encrypted. The organization receives a
threatening email demanding payment for the decryption of the database file. What type of attack has
the organization experienced?
▪ man-in-the-middle attack
▪ ransomeware
▪ Trojan horse
▪ DoS attack
Explanation: A cybersecurity specialist needs to be familiar with the characteristics of the different
types of malware and attacks that threaten an organization.
9. What three best practices can help defend against social engineering attacks? (Choose three.)
▪ Enable a policy that states that the IT department should supply information over the phone only
to managers.
▪ Add more security guards.

, ▪ Resist the urge to click on enticing web links.
▪ Deploy well-designed firewall appliances.
▪ Educate employees regarding policies.
▪ Do not provide password resets in a chat window.
Explanation: A cybersecurity specialist must be aware of the technologies and measures that are
used as countermeasures to protect the organization from threats and vulnerabilities.
10. Which statement describes a distributed denial of service attack?
▪ An attacker sends an enormous quantity of data that a server cannot handle.
▪ An attacker builds a botnet comprised of zombies.
▪ An attacker views network traffic to learn authentication credentials.
▪ One computer accepts data packets based on the MAC address of another computer.
Explanation: A cybersecurity specialist needs to be familiar with the characteristics of the different
types of malware and attacks that threaten an organization.
11. A cyber criminal sends a series of maliciously formatted packets to the database server. The server
cannot parse the packets and the event causes the server crash. What is the type of attack the cyber
criminal launches?
▪ DoS
▪ man-in-the-middle
▪ packet Injection
▪ SQL injection
Explanation: A cybersecurity specialist needs to be familiar with the characteristics of the different
types of malware and attacks that threaten an organization.
12. An executive manager went to an important meeting. The secretary in the office receives a call
from a person claiming that the executive manager is about to give an important presentation but the
presentation files are corrupted. The caller sternly recommends that the secretary email the
presentation right away to a personal email address. The caller also states that the executive is holding
the secretary responsible for the success of this presentation. Which type of social engineering tactic
would describe this scenario?
▪ urgency
▪ intimidation
▪ familiarity
▪ trusted partners
Explanation: Social engineering uses several different tactics to gain information from victims.
13. What are the two most effective ways to defend against malware? (Choose two.)
▪ Implement network firewalls.
▪ Install and update antivirus software.
▪ Implement RAID.
▪ Update the operating system and other application software.
▪ Implement strong passwords.
▪ Implement a VPN.
Explanation: A cybersecurity specialist must be aware of the technologies and measures that are
used as countermeasures to protect the organization from threats and vulnerabilities.
$12.75
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
irineachieng362

Get to know the seller

Seller avatar
irineachieng362 Walden University
Follow You need to be logged in order to follow users or courses
Sold
1
Member since
1 year
Number of followers
0
Documents
21
Last sold
9 months ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions