You are on page 1of 5

(1.

0 )Introduction to Cybersecurity
20
What is a concern when a company has a cloud-based infrastructure as part of
?its IT infrastructure
.The company shares the security footprint with other companies
More downtime is possible as a result of the borderless
.infrastructure
.Software as a service (SaaS) is not easy to implement
.Email becomes more prone to attack
19
?True or False
A computer teacher posted a photo on a social media site. Later, the teacher
decided to close the account on the social media site. The teacher deleted all the
content posted on the site including media and links. The teacher then canceled
.the account. The photo is now no longer accessible on the Internet
true
false
18
Traditionally, network personnel have the mindset of protecting the network
border. What changes may be necessary when software as a service (SaaS) is
?used
.Manipulated data must be static
.Email must be protected to a greater degree
.Security policies may need to be different if the data travels through the cloud
Social network site access time is greatly degraded due to the amount of
.processing required for the SaaS application being in the cloud
17
?When describing malware, what is a difference between a virus and a worm
A virus replicates itself by attaching to another file whereas a worm can replicate
.itself independently
A virus focuses on gaining privileged access to a device whereas a worm
.does not
A virus can be used to deliver advertisements without user consent whereas a
.worm cannot
A virus can be used to launch a DoS attack (but not a DDoS), but a worm can be
.used to launch both DoS and DDoS attacks
16
Which website is considered secure because it encrypts the communication
?between the website and visitors
/http://www.thebanks.com

/ftp://download.openproject.net
/https://www.ourblogs.info
/http://www.secureaccess.com:8080
15
?Which three features of data is cybersecurity primarily concerned with
confidentiality
integrity
manageability
availability
scalability
usability
14
What device passively monitors network traffic for anomalies that can indicate an
?attack
IDS
switch
bridge
web proxy
13
?What is cybersecurity
the use of satellites to spy on malicious users
efforts to prevent people from becoming hackers
the act of securing the Internet
the protection of cyberspace
12
What technology can be used to secure data as it travels across the public
?Internet
VPN
WPA
CSMA/CD
WEP
11
?What is the purpose of a broadcast address
to identify all hosts within a collision domain
to identify a specific group of hosts on a network
to identify all hosts within a specific network
to identify a single host
10
Which two types of applications rely on their traffic having priority over other
traffic types through the network? (Choose two.)
file transfer

instant messaging
video
voice
email
9
?What is the purpose of the routing process
to encapsulate data that is used to communicate across a network
to select the paths that are used to direct traffic to destination networks
to convert a URL name into an IP address
to provide secure Internet file transfer
to forward traffic on the basis of MAC addresses
8
Which two components are necessary for a wireless client to be installed on a
WLAN? (Choose two.)
wireless bridge
wireless NIC
crossover cable
media
wireless client software
custom adapter
7
What two default wireless router settings can affect network security? (Choose
two.)
.The SSID is broadcast
.MAC address filtering is enabled
.WEP encryption is enabled
.The wireless channel is automatically selected
.A well-known administrator password is set
6
?What is the purpose of the network security authentication function
to require users to prove who they are
to determine which resources a user can access
to keep track of the actions of a user
to provide challenge and response questions
5

4
Which network device makes forwarding decisions based on the destination
?MAC address that is contained in the frame
hub
switch
router
repeater
3

2
Which network protocol is used to automatically assign an IP address to a
?computer on a network
SMTP
APIPA
DHCP
ICMP
FTP
1
Which layer of the OSI model defines logical addressing?
transport
application
presentation
network
data link
session