Google Cybersecurity Certification Final Exam Questions With Solved Solutions.
2 keer bekeken 0 keer verkocht
Vak
Information Security Professional Certifications
Instelling
Information Security Professional Certifications
Absolute file path - Answer The full file path, which starts from the root
Access controls - Answer Security controls that manage access, authorization, and accountability of information
Active packet sniffing - Answer A type of attack where data packets are manipulated in transit
...
Google Cybersecurity Certification Final
Exam Questions With Solved Solutions.
Absolute file path - Answer The full file path, which starts from the root
Access controls - Answer Security controls that manage access, authorization, and accountability of
information
Active packet sniffing - Answer A type of attack where data packets are manipulated in transit
Address Resolution Protocol (ARP) - Answer A network protocol used to determine the MAC address of
the next router or device on the path
Advanced persistent threat (APT) - Answer An instance when a threat actor maintains unauthorized
access to a system for an extended period of time
Adversarial artificial intelligence (AI) - Answer A technique that manipulates artificial intelligence (AI)
and machine learning (ML) technology to conduct attacks more efficiently
Adware - Answer A type of legitimate software that is sometimes used to display digital advertisements
in applications
Algorithm - Answer A set of rules used to solve a problem
Analysis - Answer The investigation and validation of alerts
Angler phishing - Answer A technique where attackers impersonate customer service representatives
on social media
Anomaly-based analysis - Answer A detection method that identifies abnormal behavior
,Antivirus software - Answer A software program used to prevent, detect, and eliminate malware and
viruses
Application - Answer A program that performs a specific task
Application programming interface (API) token - Answer A small block of encrypted code that contains
information about a user
Argument (Linux) - Answer Specific information needed by a command
Argument (Python) - Answer The data brought into a function when it is called
Array - Answer A data type that stores data in a comma-separated ordered list
Assess - Answer The fifth step of the NIST RMF that means to determine if established controls are
implemented correctly
Asset - Answer An item perceived as having value to an organization
Asset classification - Answer The practice of labeling assets based on sensitivity and importance to an
organization
Asset inventory - Answer A catalog of assets that need to be protected
Asset management - Answer The process of tracking assets and the risks that affect them
Asymmetric encryption - Answer The use of a public and private key pair for encryption and decryption
of data
,Attack surface - Answer All the potential vulnerabilities that a threat actor could exploit
Attack tree - Answer A diagram that maps threats to assets
Attack vectors - Answer The pathways attackers use to penetrate security defenses
Authentication - Answer The process of verifying who someone is
Authorization - Answer The concept of granting access to specific resources in a system
Authorize - Answer The sixth step of the NIST RMF that refers to being accountable for the security and
privacy risks that might exist in an organization
Automation - Answer The use of technology to reduce human and manual effort to perform common
and repetitive tasks
Availability - Answer The idea that data is accessible to those who are authorized to access it
Baiting - Answer A social engineering tactic that tempts people into compromising their security
Bandwidth - Answer The maximum data transmission capacity over a network, measured by bits per
second
Baseline configuration (baseline image) - Answer A documented set of specifications within a system
that is used as a basis for future builds, releases, and updates
Bash - Answer The default shell in most Linux distributions
Basic auth - Answer The technology used to establish a user's request to access a server
, Basic Input/Output System (BIOS) - Answer A microchip that contains loading instructions for the
computer and is prevalent in older systems
Biometrics - Answer The unique physical characteristics that can be used to verify a person's identity
Bit - Answer The smallest unit of data measurement on a computer
Boolean data - Answer Data that can only be one of two values: either True or False
Bootloader - Answer A software program that boots the operating system
Botnet - Answer A collection of computers infected by malware that are under the control of a single
threat actor, known as the "bot-herder"
Bracket notation - Answer The indices placed in square brackets
Broken chain of custody - Answer Inconsistencies in the collection and logging of evidence in the chain
of custody
Brute force attack - Answer The trial and error process of discovering private information
Bug bounty - Answer Programs that encourage freelance hackers to find and report vulnerabilities
Built-in function - Answer A function that exists within Python and can be called directly
Business continuity - Answer An organization's ability to maintain their everyday productivity by
establishing risk disaster recovery plans
Business continuity plan (BCP) - Answer A document that outlines the procedures to sustain business
operations during and after a significant disruption
Voordelen van het kopen van samenvattingen bij Stuvia op een rij:
Verzekerd van kwaliteit door reviews
Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!
Snel en makkelijk kopen
Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.
Focus op de essentie
Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!
Veelgestelde vragen
Wat krijg ik als ik dit document koop?
Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.
Tevredenheidsgarantie: hoe werkt dat?
Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.
Van wie koop ik deze samenvatting?
Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper TestSolver9. Stuvia faciliteert de betaling aan de verkoper.
Zit ik meteen vast aan een abonnement?
Nee, je koopt alleen deze samenvatting voor €10,02. Je zit daarna nergens aan vast.