100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Essentials of Cyber Security- CISCO Exam Questions with Answers

Rating
-
Sold
-
Pages
16
Grade
A+
Uploaded on
23-09-2024
Written in
2024/2025

It looks like an attacker has targeted a vulnerability in @Apollo's online messaging service, which is used to facilitate communications between employees working across different sites. When an employee makes a voice call, it floods the memory of the application, effectively giving the attacker control over the employee's device. What type of attack is this? - Answers Buffer overflow An employee received an email that looked like it came from an @Apollo supplier asking them to click a link to claim a discount - Answers Phishing An employee received an automated phone call from the bank advising that @Apollo's account had been compromised and that they must call a specific number to reset the password - Answers Vishing An employee received a text message advising that one of @Apollo's software subscriptions is expiring and that they must update the details immediately - Answers Smishing An employee clicked on a suspicious email link. Internal/External? - Answers Internal An employee granted someone unauthorized access to Apollo's HQ. Internal/External? - Answers External

Show more Read less
Institution
Cyber Security
Course
Cyber security










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Cyber security
Course
Cyber security

Document information

Uploaded on
September 23, 2024
Number of pages
16
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Essentials of Cyber Security- CISCO Exam Questions with Answers

It looks like an attacker has targeted a vulnerability in @Apollo's online messaging service, which is used
to facilitate communications between employees working across different sites. When an employee
makes a voice call, it floods the memory of the application, effectively giving the attacker control over
the employee's device. What type of attack is this? - Answers Buffer overflow

An employee received an email that looked like it came from an @Apollo supplier asking them to click a
link to claim a discount - Answers Phishing

An employee received an automated phone call from the bank advising that @Apollo's account had
been compromised and that they must call a specific number to reset the password - Answers Vishing

An employee received a text message advising that one of @Apollo's software subscriptions is expiring
and that they must update the details immediately - Answers Smishing

An employee clicked on a suspicious email link. Internal/External? - Answers Internal

An employee granted someone unauthorized access to Apollo's HQ. Internal/External? - Answers
External

An employee connected an infected USB to their work laptop. Internal/External - Answers Internal

An employee was tricked into giving out confidential information by someone pretending to be their
manager? Internal/External - Answers External

An employee entered the wrong info into the Apollo database? Internal/External - Answers Internal

A former employee was able to download customer files by remotely accessing Apollo's network?
Internal/External - Answers Internal

Employees in an organization report that the network access is slow. Further investigation reveals that
one employee downloaded a third-party scanning program for the printer.

What type of malware may have been introduced? - Answers Worm

A cybercriminal sends a series of maliciously formatted packets to a database server, which causes the
server to crash.

What do you call this type of attack? - Answers DoS

All employees in an organization receive an email stating that their account password will expire
immediately and that they should reset their password within five minutes.

Which of the following statements best describes this email? - Answers It is a hoax

,Employees in an organization report that they cannot access the customer database on the main server.
Further investigation reveals that the database file is now encrypted. Shortly afterward, the organization
receives a threatening email demanding payment for the decryption of the database file.

What type of attack has the organization experienced? - Answers Ransomware

What non-technical method could a cybercriminal use to gather sensitive information from an
organization? - Answers Social Engineering

The awareness and identification of vulnerabilities is a critical function of a cybersecurity specialist.
Which of the following resources can they use to identify specific details about vulnerabilities? - Answers
ISO/IEC 27000 model

A secretary receives a phone call from someone claiming that their manager is about to give an
important presentation but the presentation files are corrupted.

The caller sternly asks that the secretary email the presentation right away to a personal email address.
The caller also states that the secretary is being held personally responsible for the success of this
presentation.

What type of social engineering tactic is the caller using? - Answers Intimidation

Which best practices can help defend against social engineering attacks? - Answers Educate employees
regarding security policies,

Resist the urge to click on enticing web links,

Do not provide password resets in a chat window

A penetration test carried out by an organization identified a backdoor on the network. What action
should the organization take to find out if their systems have been compromised? - Answers Look for
unauthorized accounts

What do you call an impersonation attack that takes advantage of a trusted relationship between two
systems? - Answers Spoofing

Which of the following statements describes a distributed denial of service (DDoS) attack? - Answers A
botnet of zombies, coordinated by an attacker, overwhelms a server with DoS attacks

What type of attack occurs when data goes beyond the memory areas allocated to an application? -
Answers Buffer overflow

Employees (What kind of domain is this?) - Answers User domain

Employees use a desktop, laptop, tablet or smartphone. (What kind of domain is this?) - Answers Device
domain

, Employees gain access to the @Apollo offices with an electronic staff ID card. (What kind of domain is
this?) - Answers Physical facilities domain

@Apollo's (company) network - Answers LAN domain

You are investigating a suspicious email that has been sent to @Apollo's remote workers today. It looks
like the email has been sent by Guru, asking employees to click on a link to download a virtual private
network that will secure their Wi-Fi connection while working at home. Although the email looks
legitimate, clicking on the link installs malware on the employee's device.

What type of social engineering attack is being used here? - Answers Pretexting

A friend sends you a text message to congratulate you on your new position at @Apollo after they saw
your status update on your social profile. You have not updated this information. - Answers
Impersonation

A colleague tells you that a man asked them to hold the front door on the way into the office this
morning, because he had forgotten his ID card. Your colleague had never seen this man before. -
Answers Tailgating

A customer has reported that malware infected her computer after she visited @Apollo's website.
Further investigation revealed that the customer accidentally mistyped the website address. - Answers
Typosquatting

Several employees at @Apollo have reported performance issues on their computers, with applications
running slow and notable popup ads appearing. Guru has asked you to investigate. You consult a
network monitoring tool, which also reveals abnormal traffic on the network.

Based on your findings, what type of attack do you think @Apollo might be involved with? - Answers
DDoS attack

You have just received an email from @Apollo's HR department asking you to add your bank account
details to your file by clicking on a link in the email. It stresses that this must be completed by the end of
the day for you to be included in this month's payroll.

Although the email looks like it has been sent internally, closer inspection reveals a slight variation in the
email domain of the sender's address. You could be a victim of what type of attack? - Answers
Impersonation

You are enjoying a coffee in the local cafe and decide to catch up on your emails while you wait for your
friend to arrive. You try to log on to the café's Wi-Fi but the connection looks very weak. Fortunately,
there is a second Wi-Fi with a similar name, so you log on to that.

However, unbeknownst to you, an attacker sits nearby, having created a Wi-Fi hotspot on their mobile,
which they have paired with their laptop. They are monitoring the online activity of everyone who
connects to this Wi-Fi, including you — that wasn't the café's Wi-Fi after all!

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TutorJosh Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
336
Member since
1 year
Number of followers
16
Documents
28319
Last sold
5 hours ago
Tutor Joshua

Here You will find all Documents and Package Deals Offered By Tutor Joshua.

3.6

53 reviews

5
18
4
14
3
12
2
0
1
9

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions