Cisco – Introduction to Cybersecurity Course Final Exam Answers 2022

Introduction to Cybersecurity Course Final Exam Answers 2022

1. Which of the following statements best describes cybersecurity?

  • It is a framework for security policy development
  • It is the name of a comprehensive security application for end users to protect workstations from being attacked
  • It is a standard-based model for developing firewall technologies to fight against cybercrime
  • It is an ongoing effort to protect Internet-connected systems and the data associated with those systems from unauthorized use or harm

Ans: It is an ongoing effort to protect Internet-connected systems and the data associated with those systems from unauthorized use or harm

2. An organization is experiencing overwhelming visits to a main web server. You are developing a plan to add a couple of more web servers for load balancing and redundancy.

Which requirement of information security is addressed by implementing the plan?

  • Scalability
  • Availability
  • Confidentiality
  • Integrity

Ans: Availability

3. Which of the following items are states of data?

Choose three correct answers

  • Text
  • Binary
  • Storage
  • Processing
  • ASCII
  • Transmission

Ans: Storage, Processing, Transmission

4. What names are given to a database where all cryptocurrency transactions are recorded?

Select two correct answers

  • Spreadsheet
  • Table
  • Ledger
  • Blockchain

Ans: Ledger, Blockchain

  • Weaknesses in security practices
  • Non-validated input
  • Access control problems
  • Buffer overflow
  • Race conditions

Ans: Buffer overflow

6. When describing malware, what is a difference between a virus and a worm?

  • A virus replicates itself by attaching to another file, whereas a worm can replicate itself independently
  • A virus focuses on gaining privileged access to a device, whereas a worm does not
  • A virus can be used to launch a DoS attack (but not a DDoS), but a worm can be used to launch both DoS and DDoS attacks
  • A virus can be used to deliver advertisements without user consent, whereas a worm cannot

Ans: A virus replicates itself by attaching to another file, whereas a worm can replicate itself independently

7. You are surfing the Internet using a laptop at a public Wi-Fi cafe. What should you check first before you connect to the public network?

  • If the laptop requires user authentication for file and media sharing
  • If the laptop has a master password set to secure the passwords stored in the password manager
  • That the Bluetooth adapter is disabled
  • That the laptop web browser is operating in private mode

Ans: If the laptop requires user authentication for file and media sharing

8. Which technology creates a security token that allows a user to log in to a desired web application using credentials from a social media website?

  • In-private browsing mode
  • Password manager
  • Open authorization
  • VPN service

Ans: Open authorization

9. What is the best way to avoid getting spyware on a machine?

  • Install software only from trusted websites
  • Install the latest operating system updates
  • Install the latest antivirus updates
  • Install the latest web browser updates

Ans: Install software only from trusted websites

10. Which of the following firewalls filters traffic based on application, program or service?

  • Application layer firewall
  • Network layer firewall
  • Context aware application firewall
  • Proxy server
  • Host-based firewall

Ans: Application layer firewall

11. An organization’s process of identifying and assessing risk with the goal of reducing these threats to an acceptable level is known as what?

  • Risk management
  • Vulnerability scanning
  • Disaster recovery
  • Business continuity

Ans: Risk management

12. Which of the following firewalls hides or masquerades the private addresses of network hosts?

  • Network layer firewall
  • Host-based firewall
  • Reverse proxy firewall
  • Proxy server
  • Network address translation firewall

Ans: Network address translation firewall

13. Which of the following certifications meets the U.S. Department of Defense Directive 8570.01-M requirements, which is important for anyone looking to work in IT security for the federal government?

  • CompTIA Security+
  • ISACA CSX Cybersecurity Fundamentals
  • Palo Alto Networks Certified Cybersecurity Associate
  • ISC2 Certified Information Systems Security Professional
  • EC Council Certified Ethical Hacker
  • Microsoft Technology Associate Security Fundamentals

Ans: CompTIA Security+

14. Which of the following certifications tests your understanding and knowledge in how to look for weaknesses and vulnerabilities in target systems using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner?

  • Microsoft Technology Associate Security Fundamentals
  • ISACA CSX Cybersecurity Fundamentals
  • CompTIA Security+
  • Palo Alto Networks Certified Cybersecurity Associate
  • ISC2 Certified Information Systems Security Professional
  • EC Council Certified Ethical Hacker

Ans: EC Council Certified Ethical Hacker

15. Which of these is the most recognizable and popular security certification, requiring at least five years’ relevant industry experience before you can take the exam?

  • Palo Alto Networks Certified Cybersecurity Associate
  • Microsoft Technology Associate Security Fundamentals
  • CompTIA Security+
  • ISC2 Certified Information Systems Security Professional
  • EC Council Certified Ethical Hacker
  • ISACA CSX Cybersecurity Fundamentals

Ans: ISC2 Certified Information Systems Security Professional

Happy Learning – If you require any further information, feel free to contact me.

Share your love
Saurav Hathi

Saurav Hathi

I'm currently studying Bachelor of Computer Science at Lovely Professional University in Punjab.

📌 Nodejs and Android 😎
📌 Java

Articles: 444

Leave a Reply

Your email address will not be published. Required fields are marked *