Cybersecurity Fundamentals Exam Solutions - 1198 Verified Questions

Page 1


Cybersecurity Fundamentals

Exam Solutions

Course Introduction

Cybersecurity Fundamentals offers an introduction to the core principles, concepts, and technologies that protect information systems from cyber threats. Students will explore topics such as the types of cyber attacks, risk management, security policies, cryptography, network defenses, and ethical considerations in cybersecurity. This course establishes the foundational knowledge required to understand the vulnerabilities and protective measures essential to securing both personal and organizational data in an increasingly connected world.

Recommended Textbook

Corporate Computer Security 4th Edition by

Available Study Resources on Quizplus

11 Chapters

1198 Verified Questions

1198 Flashcards

Source URL: https://quizplus.com/study-set/1400 Page 2

Chapter 1: The Threat Environment

Available Study Resources on Quizplus for this Chatper

103 Verified Questions

103 Flashcards

Source URL: https://quizplus.com/quiz/27878

Sample Questions

Q1) Which of the following can be a type of spyware?

A) A cookie

B) A keystroke logger

C) Both A and B

D) Neither A nor B

Answer: C

Q2) Employees are very dangerous because they ________.

A) often have access to sensitive parts of the system

B) are trusted by companies

C) Both A and B

D) Neither A nor B

Answer: C

Q3) ICMP Echo messages are often used in ________.

A) IP address scanning

B) port scanning

C) Both A and B

D) Neither A nor B

Answer: A

To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Planning and Policy

Available Study Resources on Quizplus for this Chatper

124 Verified Questions

124 Flashcards

Source URL: https://quizplus.com/quiz/27880

Sample Questions

Q1) Which of the following is not one of the three elements in the fraud and abuse triangle?

A) Opportunity

B) Resistance

C) Rationalization

D) Pressure

Answer: B

Q2) The book recommends hard-headed thinking about security ROI analysis.

A)True

B)False

Answer: False

Q3) In manual procedures, the segregation of duties ________.

A) reduces risk

B) increases risk by creating blind spots

C) increases risk by reducing accountability

D) can only be done safely through information technology

Answer: A

To view all questions and flashcards with answers, click on the resource link above.

Page 4

Chapter 3: Cryptography

Available Study Resources on Quizplus for this Chatper

122 Verified Questions

122 Flashcards

Source URL: https://quizplus.com/quiz/27881

Sample Questions

Q1) In public key encryption for authentication, the verifier decrypts the ciphertext with the verifier's public key.

A)True

B)False

Answer: False

Q2) In checking the digital signature, the verifier ________.

A) decrypts the digital signature it received with the supplicant's public key to get the message digest

B) hashes the plaintext message with the same algorithm used by the sender to get the message digest

C) Both A and B

D) Neither A nor B

Answer: B

Q3) In authentication, the party trying to provide its identity to the other party is called the applicant.

A)True

B)False

Answer: False

To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Secure Networks

Available Study Resources on Quizplus for this Chatper

119 Verified Questions

119 Flashcards

Source URL: https://quizplus.com/quiz/27882

Sample

Questions

Q1) Many companies continue to use WEP to avoid the cost of reconfiguring all of their access points and clients to 802.11i and because WEP has not been fully cracked yet.

A)True

B)False

Q2) ________ is a good option if an attack is aimed at a single server because it keeps transmission lines at least partially open for other communication.

A) Rate limiting

B) False open

C) Black holing

D) None of the above

Q3) Access control is more of a problem for wired LANs than for wireless LANs.

A)True

B)False

Q4) A DoS attack makes a server or network unavailable by flooding it with attack packets.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above.

6

Chapter 5: Access Control

Available Study Resources on Quizplus for this Chatper

124 Verified Questions

124 Flashcards

Source URL: https://quizplus.com/quiz/27883

Sample Questions

Q1) In directory servers, ________.

A) there can only be one O in a directory server

B) there can only be one OU in a directory server

C) Both A and B

D) Neither A nor B

Q2) Which of the following is not one of the AAA controls?

A) Authentication

B) Auditing

C) Accuracy

D) Authorizations

Q3) ________ record(s) and analyzes what a person or program actually did.

A) Authentication

B) Authorizations

C) Auditing

D) All of the above

Q4) ________ can be used to supply power during long power outages.

A) Uninterruptable power supplies

B) Electrical generators

C) Both A and B

D) Neither A nor B

To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Firewalls

Available Study Resources on Quizplus for this Chatper

100 Verified Questions

100 Flashcards

Source URL: https://quizplus.com/quiz/27884

Sample Questions

Q1) A connection opening is a state.

A)True

B)False

Q2) The last egress ACL rule in a border firewall is DENY ALL.

A)True

B)False

Q3) The firewall should go through vulnerability testing after each change.

A)True

B)False

Q4) If a firewall has to drop packets because it cannot keep up with traffic volume, this is

A) good because it will prevent possible attack packets from entering the network

B) bad because valid, non-attack packets will be dropped and this will effectively created a self-generated DOS attack

C) Both A and B

D) Neither A nor B

Q5) Creating ACLs is the most time-consuming part of firewall management. A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Host Hardening

Available Study Resources on Quizplus for this Chatper

100 Verified Questions

100 Flashcards

Source URL: https://quizplus.com/quiz/27885

Sample Questions

Q1) A Windows systems administrator should use the Administrator account ________.

A) as little as possible, and only when needed

B) as his or her main account, for auditability

C) his or her main account, for the permissions it provides

D) None of the above. The Windows systems administrator should never user the Administrator account.

Q2) In UNIX, the ________ permission allows the user to make changes.

A) execute

B) write

C) read

D) modify

Q3) Which of the following is a danger created by notebook computer loss or theft?

A) Loss of capital investment

B) Loss of sensitive data

C) Both A and B

D) Neither A nor B

Q4) UNIX offers more directory and file permissions than Windows.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Application Security

Available Study Resources on Quizplus for this Chatper

100 Verified Questions

100 Flashcards

Source URL: https://quizplus.com/quiz/27886

Sample Questions

Q1) Spammers use sticky spam, which presents their message as a graphical image.

A)True

B)False

Q2) The prevention of sensitive information from being sent out of a company is called

A) unified threat management

B) antivirus filtering

C) attachment deletion

D) extrusion prevention

Q3) Developers have permissions on the ________.

A) development server

B) testing server

C) production server

D) Both A and B

Q4) On a compromised computer, if you mistype the name of a URL, you may be taken to a malicious website even if you set your browser security to high.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above.

Page 10

Chapter 9: Data Protection

Available Study Resources on Quizplus for this Chatper

108 Verified Questions

108 Flashcards

Source URL: https://quizplus.com/quiz/27887

Sample Questions

Q1) Magnetic tape is ________.

A) expensive to use

B) very fast

C) Both A and B

D) Neither A nor B

Q2) Training users what not to put into e-mail messages is the most effective method of avoiding problems during the legal discovery process.

A)True

B)False

Q3) Typically, the shadow storage space is nearly unlimited.

A)True

B)False

Q4) Data can be lost by ________.

A) mechanical failure

B) environmental casualties

C) malware

D) All of the above

Q5) Typically, having enough shadow backup space for a few days is sufficient.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Incident and Disaster Response

Available Study Resources on Quizplus for this Chatper

107 Verified Questions

107 Flashcards

Source URL: https://quizplus.com/quiz/27879

Sample Questions

Q1) If an IDS cannot process all of the packets it receives, it will ________ packets it cannot process.

A) drop

B) pass

C) quarantine

D) None of the above

Q2) HIDSs ________.

A) provide highly specific information about what happened on a particular host

B) cannot be compromised by hacking the host

C) Both A and B

D) Neither A nor B

Q3) Which of the following is the most effective alternative for disaster recovery backup?

A) Hot sites

B) Cold sites

C) CDP

D) All of the above

Q4) False positives are legitimate activities that are flagged as suspicious.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Module A: Networking Concepts

Available Study Resources on Quizplus for this Chatper

91 Verified Questions

91 Flashcards

Source URL: https://quizplus.com/quiz/27888

Sample Questions

Q1) In a TCP half-open DoS attack, ________.

A) the attacker sends the final ACK of a session opening

B) the attacker sends an RST segment

C) Both A and B

D) Neither A nor B

Q2) The SNMP ________ command is very dangerous.

A) SET

B) GET

C) Both A and B

D) Neither A nor B

Q3) Physical and data link layer standards govern transmission in ________.

A) LANs

B) WANs

C) Both A and B

D) Neither A nor B

Q4) The main advantage of IPv6 compared to IPv4 is ________.

A) support for more IP addresses

B) faster transmission

C) higher security

D) None of the above.

Page 13

To view all questions and flashcards with answers, click on the resource link above.

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.