PDF Download
FREE AND STUDY GAMES ABOUT CYBER SECURITY EXAM
QUESTIONS
Actual Qs and Ans Expert-Verified Explanation
This Exam contains:
-Guarantee passing score -529 Questions and Answers -format set of multiple-choice -Expert-Verified Explanation
Question 1: encryption
Answer:
the process of changing information using an algorithm (or cipher) into another form that is unreadable by others - unless they possess the key to that data
Question 2: integrity
Answer:
only authorized users can change information. Data is accurate and Valid
Question 3: Remote Access Service (RAS)
Answer:
A networking Service that allows incoming connections from remote Dial-in Clients.
Question 4: Chain of custody
Answer:
Documents
Question 5: directory traversal
Answer:
aka the ../ attack. A method of accessing unauthorized parent directories
Question 6: Null session
Answer:
when used by an attacker, a malicious connection to the windows interprocess communications share
(IPC$)
Question 7: cryptographic hash
Answer:
algorithm that converts a large amount of data to a single long number, that is unlikely to be duplicated.
Question 8: downgrade attack
Answer:
when a protocol is downgraded from the current version to a previous version, exploiting backward compatibility
Question 9: Dictionary Attack
Answer:
A password attack that uses a prearranged list of likely words, trying them out one at a time
Question 10: piggybacking
Answer:
when an unauthorized person tags along with an authorized person to a restricted area
Question 11: time of day restriction
Answer:
when a user's logon hours are configured to restrict access to the network during certain times of the day and week
Question 12: Adware
Answer:
Type of spyware that pops up advertisements based on what it has learned about the user.
Question 13: discretionary access control (DAC)
Answer:
An access control policy generally determined by the owner
Question 14: static NAT
Answer:
when a single private IP address translates to a single public IP address
Question 15: ad filtering
Answer:
ways of blocking and filtering out unwanted advertisments, pop up blockers, and content filters are considered to be ad filtering methods
Question 16: web application firewall (WAF)
Answer:
an application firewall used to protect servers (and their client sessions) from XSS and SQL injection, among other attacks, during HTTP sessions
Question 17: User Domain
Answer:
the people who access and organization's information system
Question 18: black hat
Answer:
a hacker that breaks into a computer system without permission with the express purpose of theft
Question 19: grayware
Answer:
a general term used to describe applications that are behaving improperly but without serious
consequences: usually spyware
Question 20: transport layer security
Answer:
the successor to SSL, provides secure internet communications. This is shown in a browser at HTTPS
Question 21: Risk transference
Answer:
The transfer or outsourcing of risk to a third party i.e. insurance or risk sharing
Question 22: 802.1X
Answer:
An Authentification technology used to connect devices to a LAN or WLAN. It is an example of port based network access controls (NAC)
Question 23: Internet Content Filter
Answer:
a filter that is usually applied as software at the application layer and can filter out various types of internet activities
Question 24: Risk Assessment
Answer:
the attempt to determine the number of threats or hazards that could possibly occur in a given amount of time to computers/networks.
Question 25: Triple DES (3DES)
Answer:
Similar to DES but applies to the cipher algorithm three times to each cipher block
Question 26: Uptime
Answer:
total amount of time a system, application, and data are accessible. Often represented as a percentage of time available
Question 27: Terminal Access Controller Access-Control System Plus (TACACS+)
Answer:
A remote authentication protocol similar to RADIUS used in CISCO networks
Question 28: proxy auto-configuration (PAC)
Answer:
a file in web browsers that automatically chooses the appropriate proxy server.