Introduction to Cybersecurity Course Final Exam Answers 2022
1. Which of the following statements best describes cybersecurity?
- It is a framework for security policy development
- It is the name of a comprehensive security application for end users to protect workstations from being attacked
- It is a standard-based model for developing firewall technologies to fight against cybercrime
- It is an ongoing effort to protect Internet-connected systems and the data associated with those systems from unauthorized use or harm
Ans: It is an ongoing effort to protect Internet-connected systems and the data associated with those systems from unauthorized use or harm
2. An organization is experiencing overwhelming visits to a main web server. You are developing a plan to add a couple of more web servers for load balancing and redundancy.
Which requirement of information security is addressed by implementing the plan?
- Scalability
- Availability
- Confidentiality
- Integrity
Ans: Availability
3. Which of the following items are states of data?
Choose three correct answers
- Text
- Binary
- Storage
- Processing
- ASCII
- Transmission
Ans: Storage, Processing, Transmission
4. What names are given to a database where all cryptocurrency transactions are recorded?
Select two correct answers
- Spreadsheet
- Table
- Ledger
- Blockchain
Ans: Ledger, Blockchain
- Weaknesses in security practices
- Non-validated input
- Access control problems
- Buffer overflow
- Race conditions
Ans: Buffer overflow
6. When describing malware, what is a difference between a virus and a worm?
- A virus replicates itself by attaching to another file, whereas a worm can replicate itself independently
- A virus focuses on gaining privileged access to a device, whereas a worm does not
- A virus can be used to launch a DoS attack (but not a DDoS), but a worm can be used to launch both DoS and DDoS attacks
- A virus can be used to deliver advertisements without user consent, whereas a worm cannot
Ans: A virus replicates itself by attaching to another file, whereas a worm can replicate itself independently
7. You are surfing the Internet using a laptop at a public Wi-Fi cafe. What should you check first before you connect to the public network?
- If the laptop requires user authentication for file and media sharing
- If the laptop has a master password set to secure the passwords stored in the password manager
- That the Bluetooth adapter is disabled
- That the laptop web browser is operating in private mode
Ans: If the laptop requires user authentication for file and media sharing
8. Which technology creates a security token that allows a user to log in to a desired web application using credentials from a social media website?
- In-private browsing mode
- Password manager
- Open authorization
- VPN service
Ans: Open authorization
9. What is the best way to avoid getting spyware on a machine?
- Install software only from trusted websites
- Install the latest operating system updates
- Install the latest antivirus updates
- Install the latest web browser updates
Ans: Install software only from trusted websites
10. Which of the following firewalls filters traffic based on application, program or service?
- Application layer firewall
- Network layer firewall
- Context aware application firewall
- Proxy server
- Host-based firewall
Ans: Application layer firewall
11. An organization’s process of identifying and assessing risk with the goal of reducing these threats to an acceptable level is known as what?
- Risk management
- Vulnerability scanning
- Disaster recovery
- Business continuity
Ans: Risk management
12. Which of the following firewalls hides or masquerades the private addresses of network hosts?
- Network layer firewall
- Host-based firewall
- Reverse proxy firewall
- Proxy server
- Network address translation firewall
Ans: Network address translation firewall
13. Which of the following certifications meets the U.S. Department of Defense Directive 8570.01-M requirements, which is important for anyone looking to work in IT security for the federal government?
- CompTIA Security+
- ISACA CSX Cybersecurity Fundamentals
- Palo Alto Networks Certified Cybersecurity Associate
- ISC2 Certified Information Systems Security Professional
- EC Council Certified Ethical Hacker
- Microsoft Technology Associate Security Fundamentals
Ans: CompTIA Security+
14. Which of the following certifications tests your understanding and knowledge in how to look for weaknesses and vulnerabilities in target systems using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner?
- Microsoft Technology Associate Security Fundamentals
- ISACA CSX Cybersecurity Fundamentals
- CompTIA Security+
- Palo Alto Networks Certified Cybersecurity Associate
- ISC2 Certified Information Systems Security Professional
- EC Council Certified Ethical Hacker
Ans: EC Council Certified Ethical Hacker
15. Which of these is the most recognizable and popular security certification, requiring at least five years’ relevant industry experience before you can take the exam?
- Palo Alto Networks Certified Cybersecurity Associate
- Microsoft Technology Associate Security Fundamentals
- CompTIA Security+
- ISC2 Certified Information Systems Security Professional
- EC Council Certified Ethical Hacker
- ISACA CSX Cybersecurity Fundamentals
Ans: ISC2 Certified Information Systems Security Professional
Happy Learning – If you require any further information, feel free to contact me.