• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

FREE AND STUDY GAMES ABOUT SUMMATIVE 1 EXAM

Class notes Jan 11, 2026
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

PDF Download

FREE AND STUDY GAMES ABOUT SUMMATIVE 1 EXAM

QUESTIONS

Actual Qs and Ans Expert-Verified Explanation

This Exam contains:

-Guarantee passing score -53 Questions and Answers -format set of multiple-choice -Expert-Verified Explanation Question 1: What name is given to a device that controls or filters traffic going in or out of the network?

Answer:

Firewall Question 2: How can you prevent others from eavesdropping on network traffic when operating a PC on a public Wi-Fi hotspot?

Answer:

Connect with a VPN service

Question 3: What is the correct definition of risk management?

Answer:

The process of identifying and assessing risk to reduce the impact of threats and vulnerabilities

Question 4: What is a security playbook?

Answer:

A collection of repeatable queries or reports that outline a standardized process for incident detection and response

Question 5: Which of the following is an example of two factor authentication?

Answer:

Your fingerprint and your password Question 6: What is the most common goal of search engine optimization (SEO) poisoning?

Answer:

To increase web traffic to malicious sites Question 7: Which of the following should be carried out to address known software vulnerabilities of a specific application?

Answer:

Install a security patch Question 8: Which of the following security vulnerabilities could result in the receipt of malicious information that could force a program to behave in an unintended way?

Answer:

Non-validated input Question 9: What protocol is used to collect information about traffic traversing a network?

HTTPS NetFlow Telnet NAT

Answer:

Netflow Question 10: Why do IoT devices pose a greater security risk than other computing devices on a network?

Answer:

Most IoT devices do not receive frequent software updates Question 11: You are having difficulty remembering passwords for all of your online accounts.What should you do?

Answer:

Save the passwords in a centralized password manager program

Question 12: Which type of technology can prevent malicious software from monitoring user activities, collecting personal information and producing unwanted pop-up ads on a user computer?

Answer:

Antispyware

Question 13: What is the best method to prevent Bluetooth from being exploited?

Answer:

Always disable Bluetooth when it is not being used Question 14: Which of the following tools can be used to provide a list of open ports on network devices?Ping Tracert Nmap Whois

Answer:

NMap Question 15: Why might internal security threats cause greater damage to an organization than external security threats?

Answer:

Internal users have direct access to the infrastructure devices Question 16: Which of the following examples illustrates how malware might be concealed?

Answer:

An email is sent to the employees of an organization with an attachment that looks like an antivirus update, but the attachment actually consists of spyware Question 17: You have stored your data on a local hard disk. Which method would secure this data from unauthorized access?

Answer:

Data encryption

Question 18: What is the primary goal of a DoS attack?

Answer:

To prevent the target server from being able to handle additional requests Question 19: Which of the following is a key motivation of a white hat attacker?

Answer:

Discovering weaknesses of networks and systems to improve the security level of these systems Question 20: What are the foundational principles for protecting information systems as outlined in the McCumber Cube? (Choose three correct answers)

Answer:

Integrity Availability Confidentiality Question 21: What should you do in order to make sure that people you live with do not have access to your secure data?

Answer:

Set up password protection Question 22: Your neighbor tells you that they don't have an online identity. They have no social media accounts and only use the Internet to browse. Is your neighbor right?

Answer:

No Question 23: Which technology removes direct equipment and maintenance costs from the user for data backups?

Answer:

cloud service

Question 24: How do Cisco ISE and TrustSec work?

Answer:

They enforce access to network resources by creating role-based access control policies

Download Study Material

Buy This Study Material

$11.99
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: Class notes
Description:

PDF Download FREE AND STUDY GAMES ABOUT SUMMATIVE 1 EXAM QUESTIONS Actual Qs and Ans Expert-Verified Explanation This Exam contains: -Guarantee passing score -53 Questions and Answers -format set o...

UNLOCK ACCESS $11.99