Cybersecurity Fundamentals Midterm Exam - 1198 Verified Questions

Page 1


Cybersecurity Fundamentals

Midterm Exam

Course Introduction

Cybersecurity Fundamentals provides students with an essential understanding of the principles and practices used to protect information and systems from digital threats. The course covers core concepts such as network security, cryptography, threat identification, risk management, ethical and legal considerations, and security policies. Students will learn about common cyberattacks, vulnerabilities, and defense mechanisms used to safeguard data in both personal and professional environments. Through practical examples and hands-on activities, learners gain the foundational skills required to evaluate, implement, and maintain basic cybersecurity measures.

Recommended Textbook

Corporate Computer Security 4th Edition by Randy J. Boyle

Available Study Resources on Quizplus

11 Chapters

1198 Verified Questions

1198 Flashcards

Source URL: https://quizplus.com/study-set/1400

Page 2

Chapter 1: The Threat Environment

Available Study Resources on Quizplus for this Chatper

103 Verified Questions

103 Flashcards

Source URL: https://quizplus.com/quiz/27878

Sample Questions

Q1) A(n) ________ attack requires a victim host to prepare for many connections, using up resources until the computer can no longer serve legitimate users. (Choose the most specific choice.)

A) DoS

B) directly-propagating worm

C) distributed malware

D) SYN Flooding

Answer: D

Q2) Carding is more serious than identity theft.

A)True

B)False

Answer: False

Q3) Another name for safeguard is ________.

A) countermeasure

B) compromise

C) Both A and B

D) Neither A nor B

Answer: A

To view all questions and flashcards with answers, click on the resource link above. Page 3

Chapter 2: Planning and Policy

Available Study Resources on Quizplus for this Chatper

124 Verified Questions

124 Flashcards

Source URL: https://quizplus.com/quiz/27880

Sample Questions

Q1) The worst problem with classic risk analysis is that ________.

A) protections often protect multiple resources

B) resources often are protected by multiple resources

C) we cannot estimate the annualized rate of occurrence

D) costs and benefits are not the same each year

Answer: C

Q2) What security functions typically are outsourced?

A) Policy

B) Vulnerability testing

C) Both A and B

D) Neither A nor B

Answer: B

Q3) Which of the following specifies how to do certification by external parties?

A) COSO

B) CobiT

C) ISO/IEC 27000

D) All of the above have certification by external parties.

Answer: C

To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Cryptography

Available Study Resources on Quizplus for this Chatper

122 Verified Questions

122 Flashcards

Source URL: https://quizplus.com/quiz/27881

Sample Questions

Q1) Companies transmit over the wireless LANs because WLANs ________.

A) are inexpensive

B) are secure

C) Both A and B

D) Neither A nor B

Answer: B

Q2) It is OK for a verifier to receive digital certificates from the sender.

A)True

B)False

Answer: True

Q3) The hash size in SHA-1 is 160 bits.

A)True

B)False

Answer: True

Q4) ________ ciphers leave letters in their original positions.

A) Transposition

B) Substitution

C) Both A and B

D) Neither A nor B

Answer: B

Page 5

To view all questions and flashcards with answers, click on the resource link above.

Chapter 4: Secure Networks

Available Study Resources on Quizplus for this Chatper

119 Verified Questions

119 Flashcards

Source URL: https://quizplus.com/quiz/27882

Sample Questions

Q1) Some writers prefer to turn off SSID broadcasting.

A)True

B)False

Q2) An EAP message begins with an ________ message.

A) EAP request

B) EAP accept

C) EAP start

D) EAP response

Q3) Eavesdropping usually is more of a concern for ________ LANs than for ________ LANs.

A) wired, wireless

B) wireless, wired

C) about an equal concern for wired and wireless LANs

D) None of the above

Q4) WEP stands for ________.

A) wireless equivalent privacy

B) wireless equivalent policy

C) wired equivalent privacy

D) wired equivalent policy

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Access Control

Available Study Resources on Quizplus for this Chatper

124 Verified Questions

124 Flashcards

Source URL: https://quizplus.com/quiz/27883

Sample Questions

Q1) In Kerberos, the ________ is sent from the Kerberos server to the verifier.

A) ticket granting ticket

B) service ticket

C) Both A and B

D) Neither A nor B

Q2) Buildings should be set back from streets and protected with rolling hill landscaping to reduce threats from ________.

A) wireless eavesdropping

B) industrial espionage

C) casual observation

D) terrorism

Q3) Which of the following are benefits of using identity management?

A) Reduced costs

B) Centralized auditing of all an employee's access permission across a firm

C) Both A and B

D) Neither A nor B

Q4) As far as possible, identities should be managed by people closest to the situation.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Firewalls

Available Study Resources on Quizplus for this Chatper

100 Verified Questions

100 Flashcards

Source URL: https://quizplus.com/quiz/27884

Sample Questions

Q1) A socket designates a specific program designated by a port number on a specific computer's IP address.

A)True

B)False

Q2) The ________ is a subnet that contains all of the servers and application proxy firewalls that must be accessible to the outside world.

A) Internet subnet

B) server subnet

C) external subnet

D) None of the above

Q3) Most firewall database policies include less than 5 rules.

A)True

B)False

Q4) SPI filtering for packets that are part of ongoing communications is usually simple.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above.

Page 8

Chapter 7: Host Hardening

Available Study Resources on Quizplus for this Chatper

100 Verified Questions

100 Flashcards

Source URL: https://quizplus.com/quiz/27885

Sample Questions

Q1) A company should decide upon a single security baseline for use with its client PCs.

A)True

B)False

Q2) Software vendors typically release ________ patches per product in a typical year.

A) many

B) a few

C) no

Q3) Microsoft's server operating system is called ________.

A) UNIX

B) Windows Server

C) Both A and B

D) Neither A nor B

Q4) Which of the following is not a type of fix for vulnerabilities?

A) Work-arounds

B) Patches

C) Version upgrades

D) All of the above are types of fixes for vulnerabilities

To view all questions and flashcards with answers, click on the resource link above.

9

Chapter 8: Application Security

Available Study Resources on Quizplus for this Chatper

100 Verified Questions

100 Flashcards

Source URL: https://quizplus.com/quiz/27886

Sample Questions

Q1) In a stack overflow attack, to where does the return address point?

A) To the beginning of the stack entry's data area

B) To the end of the stack entry's data area

C) To the next command in the program being hacked

D) To the return address entry in the stack entry

Q2) Testers have permissions on the ________.

A) development server

B) testing server

C) production server

D) Both A and B

Q3) An attacker types more data in a field than the programmer expected. This is a(n) ________ attack.

A) denial-of-service

B) directory traversal

C) buffer overflow

D) XSS

Q4) If a hacker takes over an application program, he or she receives the permissions with which the program runs.

A)True

B)False

Page 10

To view all questions and flashcards with answers, click on the resource link above.

Chapter 9: Data Protection

Available Study Resources on Quizplus for this Chatper

108 Verified Questions

108 Flashcards

Source URL: https://quizplus.com/quiz/27887

Sample Questions

Q1) Properly backed up data includes ________.

A) ensuring that copies of data files are stored safely and secured

B) ensuring that copies of data files will survive even if the data on the host are lost and damaged

C) Both A and B

D) Neither A nor B

Q2) Trusting users to do key escrow is risky because ________.

A) the user may not do it

B) the user may not be able to find the key later

C) the user may refuse to give it up if fired

D) All of the above

Q3) CDP requires expensive high-speed transmission link between the sites.

A)True

B)False

Q4) A system using an array of drives increases reliability.

A)True

B)False

Q5) DRM restricts what people can do with sensitive material.

A)True

B)False

11

To view all questions and flashcards with answers, click on the resource link above.

Chapter 10: Incident and Disaster Response

Available Study Resources on Quizplus for this Chatper

107 Verified Questions

107 Flashcards

Source URL: https://quizplus.com/quiz/27879

Sample Questions

Q1) A ________ is a fake network segment with multiple clients and servers.

A) trap

B) honeypot

C) IDS

D) virtual network

Q2) Dropping all future packets from a particular IP address is called ________.

A) black holing

B) disconnection

C) IP address spoofing

D) damaging

Q3) ________ is the act of passing an incident to the CSIRT or business continuity team.

A) Transference

B) Escalation

C) Delegation

D) Acceleration

Q4) Once an attack has begun, a company should never allow the attacker to continue.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Module A: Networking Concepts

Available Study Resources on Quizplus for this Chatper

91 Verified Questions

91 Flashcards

Source URL: https://quizplus.com/quiz/27888

Sample Questions

Q1) A flag field has the value 1.

A) The TCP segment is an acknowledgement.

B) The field is set.

C) The field is locked.

D) The router will reduce the value to 0 and drop the packet.

Q2) In this book, when internet is spelled with a capital I, it means the global Internet.

A)True

B)False

Q3) TCP segment carries octets 4321 through 4371. What is its sequence number?

A) 4321

B) 4371

C) 4372

D) None of the above.

Q4) In an IPv4 packet, the ________ field describes the contents of the packet's data field.

A) TTL

B) header checksum

C) protocol

D) next-higher-layer

To view all questions and flashcards with answers, click on the resource link above. Page 13

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.
Cybersecurity Fundamentals Midterm Exam - 1198 Verified Questions by Quizplus - Issuu