100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
CYBR 3200 Final UPDATED Actual Exam Questions and CORRECT Answers $9.99   Add to cart

Exam (elaborations)

CYBR 3200 Final UPDATED Actual Exam Questions and CORRECT Answers

 0 view  0 purchase
  • Course
  • CYBR 3200
  • Institution
  • CYBR 3200

CYBR 3200 Final UPDATED Actual Exam Questions and CORRECT Answers What is a VPN typically used for? -secure remote access -detection of security threats -block open ports -filter harmful scripts - CORRECT ANSWER- secure remote access

Preview 4 out of 36  pages

  • September 25, 2024
  • 36
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • CYBR 3200
  • CYBR 3200
avatar-seller
MGRADES
CYBR 3200 Final UPDATED Actual Exam
Questions and CORRECT Answers
What is a VPN typically used for?
-secure remote access
-detection of security threats
-block open ports

-filter harmful scripts - CORRECT ANSWER✔✔- secure remote access


Why might you want your security system to provide nonrepudiation?
-to prevent a user from capturing packets and viewing sensitive information
-to prevent an unauthorized user from logging into the system
-to trace the origin of a worm spread through email

-so a user can't deny sending or receiving a communication - CORRECT ANSWER✔✔- so a
user can't deny sending or receiving a communication


What tool do you use to secure remote access by users who utilize the Internet?
-VPN
-IDS
-DMZ

-DiD - CORRECT ANSWER✔✔- VPN


Physical security protects a system from theft, fire, or environmental disaster.
True

False - CORRECT ANSWER✔✔- True


Reviewing log files is a time-consuming task and therefore should only be done when an
attack on the network has occurred.
True

False - CORRECT ANSWER✔✔- False

,A hactivist can best be described as which of the following?
-an unskilled programmer that spreads malicious scripts
-consider themselves seekers of knowledge
-use DoS attacks on Web sites with which they disagree

-deface Web sites by leaving messages for their friends to read - CORRECT ANSWER✔✔-
use DoS attacks on Web sites with which they disagree


A worm creates files that copy themselves repeatedly and consume disk space.
True

False - CORRECT ANSWER✔✔- True


Which of the following is NOT one of the three primary goals of information security?
confidentiality
integrity
impartiality

availability - CORRECT ANSWER✔✔- impartiality


Which type of attack works by an attacker operating between two computers in a network
and impersonating one computer to intercept communications?
malicious port scanning
man-in-the-middle
denial of service

remote procedure call - CORRECT ANSWER✔✔- man-in-the-middle


With discretionary access control, network users can share information with other users,
making it more risky than MAC.
True

False - CORRECT ANSWER✔✔- True


In which form of authentication does the authenticating device generate a random code and
send it to the user who wants to be authenticated?

,basic
challenge/response
biometrics

signature - CORRECT ANSWER✔✔- challenge/response


What is a program that appears to do something useful but is actually malware?
virus
logic bomb
Trojan

back door - CORRECT ANSWER✔✔- Trojan


Defense in depth can best be described as which of the following?
a firewall that protects the network and the servers
a layered approach to security
antivirus software and firewalls

authentication and encryption - CORRECT ANSWER✔✔- a layered approach to security


Which of the following is the broadcast address for subnet 192.168.10.32 with subnet mask
255.255.255.240
192.168.10.63
192.168.10.47
192.168.10.23

192.168.10.95 - CORRECT ANSWER✔✔- 192.168.10.47


The TCP protocol uses a three-way handshake to create a connection.
True

False - CORRECT ANSWER✔✔- True


The IP address 172.20.1.5 is a private IP address.
True

, False - CORRECT ANSWER✔✔- True


Which of the following is a valid IPv6 address?
5BA4:2391:0:0:4C3E
1080::8:800:200C:417A
24::5B1A::346C

5510:ABCD::34:1::2 - CORRECT ANSWER✔✔- 1080::8:800:200C:417A


The Transport layer of the OSI model includes the RIP protocol.
True

False - CORRECT ANSWER✔✔- False


Which of the following addresses is a Class B IP address?
126.14.1.7
224.14.9.11
189.77.101.6

211.55.119.7 - CORRECT ANSWER✔✔- 189.77.101.6


What should you do when configuring DNS servers that are connected to the Internet in order
to improve security?
disable zone transfers
delete the DNS cache
disable DNS buffers

setup DNS proxy - CORRECT ANSWER✔✔- disable zone transfers


Which of the following is the first packet sent in the TCP three-way handshake?
RST
SYN
ACK

PSH - CORRECT ANSWER✔✔- SYN

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller MGRADES. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $9.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

76658 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$9.99
  • (0)
  Add to cart