100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CCST - Cybersecurity Questions and Answers 2024 $14.49   Add to cart

Exam (elaborations)

CCST - Cybersecurity Questions and Answers 2024

 0 view  0 purchase
  • Course
  • Cyber security
  • Institution
  • Cyber Security

CCST - Cybersecurity

Preview 3 out of 20  pages

  • September 17, 2024
  • 20
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • Cyber security
  • Cyber security
avatar-seller
julianah420
CCST - Cybersecurity

The responsibilities for a Junior Security Analyst are: - answer1- Preparation and
Prevention.
2- Monitoring and Investigation.
3- Response.

The Security Operations Center (SOC) Three-Tier Model: - answer Tire 1: Junior
Security Analyst - Triage Specialist
Tire 2: Security Operations Analyst - Incident Responder
Tire 3: Security Operations Analyst - Threat Hunter.

What is hardening? - answer The process of securing a system by reducing
vulnerabilities, removing unnecessary services, implementing security controls, and
following best practices to minimize the attack surface.

Defense-in-Depth/Layered Security - answer An approach that involves deploying
multiple layers of security controls and measures to protect systems and data. If one
layer is compromised, other layers can still provide protection.

What is a denial-of-service (DoS) attack? - answerAttacks aimed at rendering a
network, system, or service unavailable by overwhelming it with a flood of illegitimate
requests or excessive traffic.

What is a botnet? - answerNetworks of compromised computers controlled by a central
attacker, typically used for launching coordinated attacks, distributing spam, or
conducting DDoS attacks.

What is a man-in-the-middle (MitM) attack? - answerAttacks where an attacker
intercepts and alters communication between two parties without their knowledge. This
allows the attacker to eavesdrop, modify, or steal information.

Why does IoT technology pose a greater risk than other computing technology on a
network? - answerInternet of Things devices often lack robust security measures,
making them susceptible to attacks. Vulnerabilities in IoT devices can lead to
unauthorized access, data breaches, or control manipulation.

Which tool is used to provide a list of open ports on network devices? -
answerNmap/Zenmap

What is the most common goal of search engine optimization (SEO) poisoning? -
answerto increase web traffic to malicious sites

,A user is surfing the Internet using a laptop at a public WiFi cafe. What should be
checked first when the user connects to the public network? - answerif the laptop
requires user authentication for file and media sharing

Which protocol is used by the Cisco Cyberthreat Defense Solution to collect information
about the traffic that is traversing the network? - answerNetFlow

Any device that controls or filters traffic going in or out of the network is known as a
___________. - answerFirewall

Which tool can perform real-time traffic and port analysis, and can also detect port
scans, fingerprinting and buffer overflow attacks? - answerSnort

What is the best approach to prevent a compromised IoT device from maliciously
accessing data and devices on a local network? - answerPlace all IoT devices that have
access to the Internet on an isolated network.

What is that main function of the Cisco Security Incident Response Team? - answerTo
ensure company, system, and data preservation

Which technology creates a security token that allows a user to log in to a desired web
application using credentials from a social media website? - answerOpen Authentication

Which stage of the kill chain used by attackers focuses on the identification and
selection of targets? - answerReconnaissance

For what purpose would a network administrator use the Nmap tool? - answerDetection
and identification of open ports

What is the Nmap utility used for? - answerIt is an open source tool for scanning
vulnerabilities of systems and networks. It can identify open ports on a host.

What type of attack uses zombies? - answerDDoS

A medical office employee sends emails to patients about recent patient visits to the
facility. What information would put the privacy of the patients at risk if it was included in
the email? - answerPatient Records

Which two tools used for incident detection can be used to detect anomalous behavior,
to detect command and control traffic, and to detect infected hosts? - answerIntrusion
Detection System
and
NetFlow

, What is the IoT (internet of things) - answerThe connection of a broad array of physical
devices to the internet, enabling data collection and management via software.
Can include: Sensors and equipment

What is IMPACT? - answerThe international multilateral partnership against cyber
threats --
a global partnership of world governments, industries, and academia dedicated to
improving global capabilities when dealing with cyber threats.

What is meant by the term "Sniffing"? - answerWhen an attacker listens and captures
packets sent on neatwork at attempt to discover password

What is the Gramm-Leach-Bliley Act (GLBA)? - answer

What is the Sarbanes-Oxley Act? - answer

What is PCI DSS? - answer

What is the Electronic Communications Privacy Act (ECPA)? - answerAims to ensure
work place privacy and protects a range of electronic communications, such as email
and telephone conversation, from unauthorized interception, access, use, and
disclosure

What is the Computer Fraud and Abuse Act (CFAA) of 1986? - answerProhibits the
unauthorized access of computer systems. Knowingly accessing a government
computer without permission or accessing any computer used in or affecting interstate
or foreign commerce is a criminal offense.

The Privacy Act of 1974: - answer

The Freedom of Information Act (FOIA): - answer

What is FERPA (Family Education Rights and Privacy Act of 1974)? - answer

What is COPPA? - answerThe Children's Online Privacy Protection Act (COPPA) is a
law created to protect the privacy of children under 13. The Act was passed by the U.S.
Congress in 1998 and took effect in April 2000. COPPA is managed by the Federal
Trade Commission (FTC).

What is CIPA? - answerThe Children's Internet Protection Act (CIPA) requires that K-12
schools and libraries in the United States use Internet filters and implement other
measures to protect children from harmful online content as a condition for federal
funding.

What is VPPA? - answer

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller julianah420. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $14.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

72841 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$14.49
  • (0)
  Add to cart