PDF Download
FREE AND STUDY GAMES ABOUT SUMMATIVE 1 EXAM
QUESTIONS
Actual Qs and Ans Expert-Verified Explanation
This Exam contains:
-Guarantee passing score -53 Questions and Answers -format set of multiple-choice -Expert-Verified Explanation Question 1: What name is given to a device that controls or filters traffic going in or out of the network?
Answer:
Firewall Question 2: How can you prevent others from eavesdropping on network traffic when operating a PC on a public Wi-Fi hotspot?
Answer:
Connect with a VPN service
Question 3: What is the correct definition of risk management?
Answer:
The process of identifying and assessing risk to reduce the impact of threats and vulnerabilities
Question 4: What is a security playbook?
Answer:
A collection of repeatable queries or reports that outline a standardized process for incident detection and response
Question 5: Which of the following is an example of two factor authentication?
Answer:
Your fingerprint and your password Question 6: What is the most common goal of search engine optimization (SEO) poisoning?
Answer:
To increase web traffic to malicious sites Question 7: Which of the following should be carried out to address known software vulnerabilities of a specific application?
Answer:
Install a security patch Question 8: Which of the following security vulnerabilities could result in the receipt of malicious information that could force a program to behave in an unintended way?
Answer:
Non-validated input Question 9: What protocol is used to collect information about traffic traversing a network?
HTTPS NetFlow Telnet NAT
Answer:
Netflow Question 10: Why do IoT devices pose a greater security risk than other computing devices on a network?
Answer:
Most IoT devices do not receive frequent software updates Question 11: You are having difficulty remembering passwords for all of your online accounts.What should you do?
Answer:
Save the passwords in a centralized password manager program
Question 12: Which type of technology can prevent malicious software from monitoring user activities, collecting personal information and producing unwanted pop-up ads on a user computer?
Answer:
Antispyware
Question 13: What is the best method to prevent Bluetooth from being exploited?
Answer:
Always disable Bluetooth when it is not being used Question 14: Which of the following tools can be used to provide a list of open ports on network devices?Ping Tracert Nmap Whois
Answer:
NMap Question 15: Why might internal security threats cause greater damage to an organization than external security threats?
Answer:
Internal users have direct access to the infrastructure devices Question 16: Which of the following examples illustrates how malware might be concealed?
Answer:
An email is sent to the employees of an organization with an attachment that looks like an antivirus update, but the attachment actually consists of spyware Question 17: You have stored your data on a local hard disk. Which method would secure this data from unauthorized access?
Answer:
Data encryption
Question 18: What is the primary goal of a DoS attack?
Answer:
To prevent the target server from being able to handle additional requests Question 19: Which of the following is a key motivation of a white hat attacker?
Answer:
Discovering weaknesses of networks and systems to improve the security level of these systems Question 20: What are the foundational principles for protecting information systems as outlined in the McCumber Cube? (Choose three correct answers)
Answer:
Integrity Availability Confidentiality Question 21: What should you do in order to make sure that people you live with do not have access to your secure data?
Answer:
Set up password protection Question 22: Your neighbor tells you that they don't have an online identity. They have no social media accounts and only use the Internet to browse. Is your neighbor right?
Answer:
No Question 23: Which technology removes direct equipment and maintenance costs from the user for data backups?
Answer:
cloud service
Question 24: How do Cisco ISE and TrustSec work?
Answer:
They enforce access to network resources by creating role-based access control policies