100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
JCCC Cyber Security Fundamentals Chapter Tests (Except Chpt6) Questions and Answers 100% Accurate CA$18.70   Add to cart

Exam (elaborations)

JCCC Cyber Security Fundamentals Chapter Tests (Except Chpt6) Questions and Answers 100% Accurate

 4 views  0 purchase
  • Course
  • JCCC
  • Institution
  • JCCC

JCCC Cyber Security Fundamentals Chapter Tests (Except Chpt6)

Preview 4 out of 31  pages

  • October 31, 2024
  • 31
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • JCCC
  • JCCC
avatar-seller
JCCC Cyber Security Fundamentals
Chapter Tests (Except Chpt6)

In information security, what are the three main goals? (Select the three best answers) -
answer Integrity
Confidentiality
Availability

To protect malicious attacks, what should you think like? - answer Hacker

Tom sends out many e-mails containing secure information to other companies. What
concept should be implemented to prove that Tom did indeed send the e-mails? -
answer on-repudiation

Which of the following does the A in CIA stand for when it comes to IT security? (select
the best answer.) - answer Availability

Which of the following is the greatest risk when it comes to removable storage? -
answer Confidentiality of data

When it comes to information security, what is the I in CIA? - answer Integrity

You are developing a security plan for your organization. Which of the following is an
example of a physical control? – answer ID card

A user receive an e-mail but the e-mail client software says that the digital signature is
invalid and the sender of the e-mail cannot be verified. The would-be recipient is
concerned about which of the following concepts? - answer Integrity

Cloud environments often reuse the same physical hardware (such as hard drives) for
multiple customers. These hard drives are used and reused when customer virtual
machines are created and deleted over time. What security concern does this bring up
implications for? - answer Data confidentiality

Which of the following individuals uses code with little knowledge of how it works? -
answerScript Kiddie

When is a system completely secure? - answerNever

A group of compromised computers that have software installed by a worm or Trojan is
known as which of the following? - answerBotnet

,Which of the following computer security threats can be updated automatically and
remotely? (Select the best answer) - answerZombie

You have been given the task of scanning for viruses on a PC. What is the best of the
following methods? - answerRecovery environment

Which of the following is a common symptom of spyware? - answerPop-up windows

Dan is a network administrator. One day he notices that his DHCP server is flooded with
information. He analyzes it and finds that the information is coming from more than 50
computers on the network. Which of the following is the most likely reason? -
answerWorm

Which of the following is not an example of malicious software? - answerBrowser

Which type of attack uses more than one computer? - answerDDoS

What is a malicious attack that executes at the same time every week? - answerLogic
Bomb

Which of these is a true statement concerning active interception? - answerWhen a
computer is put between a sender and receiver

Which of the following types of scanners can locate a rootkit on a computer? -
answerMalware scanner

Which type of malware does not require a user to execute a program to distribute the
software? - answerWorm

Whitelisting, blacklisting, and closing open relays are all mitigation techniques
addressing what kind of threat? - answerSpam

How do most network-based viruses spread? - answerThrough e-mail

Which of the following defines the difference between a Trojan horse and a worm?
(select the best answer) - answerWorms self-replicate but Trojan horses do not

Which of the following types of viruses hides its code to mask itself? - answerArmored
virus

Which of the following types of malware appears to the user as legitimate but actually
enables unauthorized access to the user's computer? - answerTrojan

Which of the following would be considered detrimental effects of a virus hoax? (select
the two best answers) - answerTechnical support resources are consumed by increased
user calls

,Users are tricked into changing the system configuration

One of your co-workers complains of very slow system performance and says that a lot
of antivirus messages are being displayed. The user admits to recently installing pirated
software and downloading and installing an illegal keygen to activate the software. What
type of malware has affected the user's computer? - answerTrojan

A user complains that they were browsing the Internet when the computer started acting
erratically and crashed. You reboot the computer and notice that performance is very
slow. In addition, after running a netstat command you notice literally hundreds of
outbound connections to various websites, many of which are well-known sites. Which
of the following has happened? - answerThe computer is now part of a botnet

One of your users was not being careful when browsing the Internet. The user was
redirected to a warez site where a number of pop-ups appeared. After clicking one pop-
up by accident, a drive--by download of unwanted software occurred. What does the
download most likely contain? - answerSpyware

You are the network administrator for a small organization without much in the way of
security policies. While analyzing your servers' performance you find various chain
messages have been received by the company. Which type of security control should
you implement to fix the problem? - answerAnti-spam

You are the security administrator for your organization and have just completed a
routine server audit. You did not notice any abnormal activity. However, another
network security analyst finds connections to unauthorized ports from outside the
organization's network. Using security tools, the analyst find hidden processes that are
running on the server. Which of the following has most likely been installed on the
server? - answerRootkit

What are some of the drawbacks to using HIDS instead of a NIDS on a server? (Select
the two best answers) - answerA HIDS may use a lot of resources, which can slow
server performance.
A HIDS cannot detect network attacks

What are two ways to secure the computer within the BIOS? (Select the two best
answers). - answerConfigure a supervisor password
Set the hard drive first in the boot order.

What are the two ways in which you can stop employees from using USB flash drives
(select two). - answerDisable the SB root hub
Disable USB devices in the BIOS

Which of the following are Bluetooth threats? (Select the two best answers.) -
answerBluesnarfing
Bluejacking

, To mitigate risks when users access company e-mail with their smartphone, what
security policy should be implemented? - answerA password should be set on the
smartphone.

Your manager wants you to implement a type of intrusion detection system (IDS) that
can be matched to certain types of traffic patterns. What kind of IDS is this? -
answerSignature based IDS

You are the security administrator for your organization. You want to ensure the
confidentiality of data on mobile devices. What is the best solution? - answerDevice
encyption

You are tasked with implementing a solution that encrypts the CEO's laptop. However,
you are not allowed to purchase additional hardware or software. Which of the following
solutions should you implement? - answerTPM

A smartphone has been lost. You need to ensure 100% that no data can be retrieved
from it. What should you do? - answerRemote wipe

Which of the following is a concern based on a user taking pictures with a smartphone?
- answerGeotagging

A smartphone is an easy target for theft. Which of the following are the best methods to
protect the confidential data on the device? (Select the two best answers.) -
answerEncryption
Remote wipe

Carl is the security administrator for a transportation company. Which of the following
should he encrypt to protect the data on a smartphone? (Select the two best answers.) -
answerInternal memory
Removable memory cards

Which of the following is an advantage of implementing individual file encryption on a
hard drive that already uses whole disk encryption? - answerIndividual encrypted files
will remain encrypted if they are copied to external drives.

You oversee compliance with financial regulations for credit card transactions. You
need to block out certain ports on the individual computers that do these transactions.
What should you implement to best achieve your goal? - answerHost-based firewall

Which of the following would most likely be considered for DLP? - answerUSB mass
storage device

Virtualization technology is often implemented as operating systems and applications
that run in software. Often, it is implemented as a virtual machine. Of the following,

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Dreamer252. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for CA$18.70. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

67096 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
CA$18.70
  • (0)
  Add to cart