100% tevredenheidsgarantie Direct beschikbaar na betaling Zowel online als in PDF Je zit nergens aan vast
logo-home
JCCC Cyber Security Fundamentals Chapter Tests (Except Chpt6) Questions and Answers 100% Accurate €12,74   In winkelwagen

Tentamen (uitwerkingen)

JCCC Cyber Security Fundamentals Chapter Tests (Except Chpt6) Questions and Answers 100% Accurate

 4 keer bekeken  0 keer verkocht
  • Vak
  • JCCC
  • Instelling
  • JCCC

JCCC Cyber Security Fundamentals Chapter Tests (Except Chpt6)

Voorbeeld 4 van de 31  pagina's

  • 31 oktober 2024
  • 31
  • 2024/2025
  • Tentamen (uitwerkingen)
  • Vragen en antwoorden
  • JCCC
  • JCCC
avatar-seller
JCCC Cyber Security Fundamentals
Chapter Tests (Except Chpt6)

In information security, what are the three main goals? (Select the three best answers) -
answer Integrity
Confidentiality
Availability

To protect malicious attacks, what should you think like? - answer Hacker

Tom sends out many e-mails containing secure information to other companies. What
concept should be implemented to prove that Tom did indeed send the e-mails? -
answer on-repudiation

Which of the following does the A in CIA stand for when it comes to IT security? (select
the best answer.) - answer Availability

Which of the following is the greatest risk when it comes to removable storage? -
answer Confidentiality of data

When it comes to information security, what is the I in CIA? - answer Integrity

You are developing a security plan for your organization. Which of the following is an
example of a physical control? – answer ID card

A user receive an e-mail but the e-mail client software says that the digital signature is
invalid and the sender of the e-mail cannot be verified. The would-be recipient is
concerned about which of the following concepts? - answer Integrity

Cloud environments often reuse the same physical hardware (such as hard drives) for
multiple customers. These hard drives are used and reused when customer virtual
machines are created and deleted over time. What security concern does this bring up
implications for? - answer Data confidentiality

Which of the following individuals uses code with little knowledge of how it works? -
answerScript Kiddie

When is a system completely secure? - answerNever

A group of compromised computers that have software installed by a worm or Trojan is
known as which of the following? - answerBotnet

,Which of the following computer security threats can be updated automatically and
remotely? (Select the best answer) - answerZombie

You have been given the task of scanning for viruses on a PC. What is the best of the
following methods? - answerRecovery environment

Which of the following is a common symptom of spyware? - answerPop-up windows

Dan is a network administrator. One day he notices that his DHCP server is flooded with
information. He analyzes it and finds that the information is coming from more than 50
computers on the network. Which of the following is the most likely reason? -
answerWorm

Which of the following is not an example of malicious software? - answerBrowser

Which type of attack uses more than one computer? - answerDDoS

What is a malicious attack that executes at the same time every week? - answerLogic
Bomb

Which of these is a true statement concerning active interception? - answerWhen a
computer is put between a sender and receiver

Which of the following types of scanners can locate a rootkit on a computer? -
answerMalware scanner

Which type of malware does not require a user to execute a program to distribute the
software? - answerWorm

Whitelisting, blacklisting, and closing open relays are all mitigation techniques
addressing what kind of threat? - answerSpam

How do most network-based viruses spread? - answerThrough e-mail

Which of the following defines the difference between a Trojan horse and a worm?
(select the best answer) - answerWorms self-replicate but Trojan horses do not

Which of the following types of viruses hides its code to mask itself? - answerArmored
virus

Which of the following types of malware appears to the user as legitimate but actually
enables unauthorized access to the user's computer? - answerTrojan

Which of the following would be considered detrimental effects of a virus hoax? (select
the two best answers) - answerTechnical support resources are consumed by increased
user calls

,Users are tricked into changing the system configuration

One of your co-workers complains of very slow system performance and says that a lot
of antivirus messages are being displayed. The user admits to recently installing pirated
software and downloading and installing an illegal keygen to activate the software. What
type of malware has affected the user's computer? - answerTrojan

A user complains that they were browsing the Internet when the computer started acting
erratically and crashed. You reboot the computer and notice that performance is very
slow. In addition, after running a netstat command you notice literally hundreds of
outbound connections to various websites, many of which are well-known sites. Which
of the following has happened? - answerThe computer is now part of a botnet

One of your users was not being careful when browsing the Internet. The user was
redirected to a warez site where a number of pop-ups appeared. After clicking one pop-
up by accident, a drive--by download of unwanted software occurred. What does the
download most likely contain? - answerSpyware

You are the network administrator for a small organization without much in the way of
security policies. While analyzing your servers' performance you find various chain
messages have been received by the company. Which type of security control should
you implement to fix the problem? - answerAnti-spam

You are the security administrator for your organization and have just completed a
routine server audit. You did not notice any abnormal activity. However, another
network security analyst finds connections to unauthorized ports from outside the
organization's network. Using security tools, the analyst find hidden processes that are
running on the server. Which of the following has most likely been installed on the
server? - answerRootkit

What are some of the drawbacks to using HIDS instead of a NIDS on a server? (Select
the two best answers) - answerA HIDS may use a lot of resources, which can slow
server performance.
A HIDS cannot detect network attacks

What are two ways to secure the computer within the BIOS? (Select the two best
answers). - answerConfigure a supervisor password
Set the hard drive first in the boot order.

What are the two ways in which you can stop employees from using USB flash drives
(select two). - answerDisable the SB root hub
Disable USB devices in the BIOS

Which of the following are Bluetooth threats? (Select the two best answers.) -
answerBluesnarfing
Bluejacking

, To mitigate risks when users access company e-mail with their smartphone, what
security policy should be implemented? - answerA password should be set on the
smartphone.

Your manager wants you to implement a type of intrusion detection system (IDS) that
can be matched to certain types of traffic patterns. What kind of IDS is this? -
answerSignature based IDS

You are the security administrator for your organization. You want to ensure the
confidentiality of data on mobile devices. What is the best solution? - answerDevice
encyption

You are tasked with implementing a solution that encrypts the CEO's laptop. However,
you are not allowed to purchase additional hardware or software. Which of the following
solutions should you implement? - answerTPM

A smartphone has been lost. You need to ensure 100% that no data can be retrieved
from it. What should you do? - answerRemote wipe

Which of the following is a concern based on a user taking pictures with a smartphone?
- answerGeotagging

A smartphone is an easy target for theft. Which of the following are the best methods to
protect the confidential data on the device? (Select the two best answers.) -
answerEncryption
Remote wipe

Carl is the security administrator for a transportation company. Which of the following
should he encrypt to protect the data on a smartphone? (Select the two best answers.) -
answerInternal memory
Removable memory cards

Which of the following is an advantage of implementing individual file encryption on a
hard drive that already uses whole disk encryption? - answerIndividual encrypted files
will remain encrypted if they are copied to external drives.

You oversee compliance with financial regulations for credit card transactions. You
need to block out certain ports on the individual computers that do these transactions.
What should you implement to best achieve your goal? - answerHost-based firewall

Which of the following would most likely be considered for DLP? - answerUSB mass
storage device

Virtualization technology is often implemented as operating systems and applications
that run in software. Often, it is implemented as a virtual machine. Of the following,

Voordelen van het kopen van samenvattingen bij Stuvia op een rij:

Verzekerd van kwaliteit door reviews

Verzekerd van kwaliteit door reviews

Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!

Snel en makkelijk kopen

Snel en makkelijk kopen

Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.

Focus op de essentie

Focus op de essentie

Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper Dreamer252. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor €12,74. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 67096 samenvattingen verkocht

Opgericht in 2010, al 14 jaar dé plek om samenvattingen te kopen

Start met verkopen

Laatst bekeken door jou


€12,74
  • (0)
  Kopen