Question 1
2 / 2 pts
0 multiple_choice_question   92286749
What is an example of early warning systems that can be used to thwart cybercriminals?
 
exact_answer none 89042
 
exact_answer none 44708
Correct!
 
exact_answer none 74583
 
exact_answer none 67736

Refer to curriculum topic: 1.2.2
Early warning systems help identify attacks and can be used by cybersecurity specialists to protect systems.

 
Question 2
2 / 2 pts
0 multiple_answers_question   92286748
A specialist in the HR department is invited to promote the cybersecurity program in community schools. Which three topics would the specialist emphasize in the presentation to draw students to this field? (Choose three.)
 
exact_answer none 65872
Correct!
 
exact_answer none 17844
Correct!
 
exact_answer none 58882
Correct!
 
exact_answer none 34501
 
exact_answer none 19843
 
exact_answer none 97690

Refer to curriculum topic: 1.2.2
The increased demand for cybersecurity specialists offers several unique career opportunities.

 
Question 3
2 / 2 pts
0 multiple_choice_question   92286745
A cybersecurity specialist is asked to identify the potential criminals known to attack the organization. Which type of hackers would the cybersecurity specialist be least concerned with?
 
exact_answer none 81188
Correct!
 
exact_answer none 4532
 
exact_answer none 98407
 
exact_answer none 81762

Refer to curriculum topic: 1.2.1
Hackers are classified by colors to help define the purpose of their break-in activities.

 
Question 4
2 / 2 pts
0 multiple_choice_question   92286595
Which technology can be implemented as part of an authentication system to verify the identification of employees?
 
exact_answer none 68032
Correct!
 
exact_answer none 12453
 
exact_answer none 69622
 
exact_answer none 85921

Refer to curriculum topic: 2.2.1
A cybersecurity specialist must be aware of the technologies available that support the CIA triad.

 
Question 5
2 / 2 pts
0 multiple_choice_question   92286601
A security specialist is asked for advice on a security measure to prevent unauthorized hosts from accessing the home network of employees. Which measure would be most effective?
 
exact_answer none 64686
 
exact_answer none 49138
Correct!
 
exact_answer none 1504
 
exact_answer none 96323

Refer to curriculum topic: 2.4.1
Protecting data confidentiality requires an understanding of the technologies used to protect data in all three data states.

 
Question 6
2 / 2 pts
0 multiple_answers_question   92286597
What are three states of data during which data is vulnerable? (Choose three.)
Correct!
 
exact_answer none 43681
 
exact_answer none 12272
 
exact_answer none 87870
 
exact_answer none 17192
Correct!
 
exact_answer none 62633
Correct!
 
exact_answer none 30740

Refer to curriculum topic: 2.3.1
A cybersecurity specialist must be aware of each of the three states of data to effectively protect data and information. Purged data was stored data. Encrypted and decrypted data can be in any of the three states.

 
Question 7
2 / 2 pts
0 multiple_choice_question   92286598
Which data state is maintained in NAS and SAN services?
 
exact_answer none 8370
 
exact_answer none 24469
 
exact_answer none 90078
Correct!
 
exact_answer none 31941

Refer to curriculum topic: 2.3.1
A cybersecurity specialist must be familiar with the types of technologies used to store, transmit, and process data.

 
Question 8
2 / 2 pts
0 multiple_choice_question   92286603
Which framework should be recommended for establishing a comprehensive information security management system in an organization?
Correct!
 
exact_answer none 25606
 
exact_answer none 62488
 
exact_answer none 21175
 
exact_answer none 79302

Refer to curriculum topic: 2.5.1
A cybersecurity specialist needs to be familiar with the different frameworks and models for managing information security.

 
Question 9
2 / 2 pts
0 multiple_choice_question   92286696
Users report that the database on the main server cannot be accessed. A database administrator verifies the issue and notices that the database file is now encrypted. The organization receives a threatening email demanding payment for the decryption of the database file. What type of attack has the organization experienced?
 
exact_answer none 40559
 
exact_answer none 85182
Correct!
 
exact_answer none 77974
 
exact_answer none 25394

Refer to curriculum topic: 3.1.1
A cybersecurity specialist needs to be familiar with the characteristics of the different types of malware and attacks that threaten an organization.

 
Question 10
2 / 2 pts
0 multiple_choice_question   92286699
What type of attack will make illegitimate websites higher in a web search result list?
Correct!
 
exact_answer none 56622
 
exact_answer none 84345
 
exact_answer none 13218
 
exact_answer none 92185

Refer to curriculum topic: 3.1.2
A cybersecurity specialist needs to be familiar with the characteristics of the different types of malware and attacks that threaten an organization.

 
Question 11
2 / 2 pts
0 multiple_choice_question   92286705
What is an impersonation attack that takes advantage of a trusted relationship between two systems?
Correct!
 
exact_answer none 9909
 
exact_answer none 56036
 
exact_answer none 94225
 
exact_answer none 49764

Refer to curriculum topic: 3.3.1
A cybersecurity specialist needs to be familiar with the characteristics of the different types of malware and attacks that threaten an organization.

 
Question 12
2 / 2 pts
0 multiple_choice_question   92286697
A penetration testing service hired by the company has reported that a backdoor was identified on the network. What action should the organization take to find out if systems have been compromised?
Correct!
 
exact_answer none 98866
 
exact_answer none 43619
 
exact_answer none 71396
 
exact_answer none 34805

Refer to curriculum topic: 3.1.1
A cybersecurity specialist needs to be familiar with the characteristics of the different types of malware and attacks that threaten an organization.

 
Question 13
2 / 2 pts
0 multiple_choice_question   92286701
An executive manager went to an important meeting. The secretary in the office receives a call from a person claiming that the executive manager is about to give an important presentation but the presentation files are corrupted. The caller sternly recommends that the secretary email the presentation right away to a personal email address. The caller also states that the executive is holding the secretary responsible for the success of this presentation. Which type of social engineering tactic would describe this scenario?
 
exact_answer none 70448
 
exact_answer none 32533
Correct!
 
exact_answer none 76334
 
exact_answer none 84478

Refer to curriculum topic: 3.2.1
Social engineering uses several different tactics to gain information from victims.

 
Question 14
2 / 2 pts
0 multiple_choice_question   92286707
Which statement describes a distributed denial of service attack?"
 
exact_answer none 34761
Correct!
 
exact_answer none 36027
 
exact_answer none 55207
 
exact_answer none 10892

Refer to curriculum topic: 3.3.1
A cybersecurity specialist needs to be familiar with the characteristics of the different types of malware and attacks that threaten an organization.

 
Question 15
2 / 2 pts
0 multiple_choice_question   92286700
What is a nontechnical method that a cybercriminal would use to gather sensitive information from an organization?
 
exact_answer none 63202
 
exact_answer none 52243
Correct!
 
exact_answer none 72710
 
exact_answer none 39916

Refer to curriculum topic: 3.2.1
A cybersecurity specialist needs to be familiar with the characteristics of the different types of malware and attacks that threaten an organization.

 
Question 16
2 / 2 pts
0 multiple_choice_question   92286551
What happens as the key length increases in an encryption application?
 
exact_answer none 27856
 
exact_answer none 55750
 
exact_answer none 11223
Correct!
 
exact_answer none 70496

Refer to curriculum topic: 4.1.4
Encryption is an important technology used to protect confidentiality. It is important to understand the characteristics of the various encryption methodologies.

 
Question 17
2 / 2 pts
0 multiple_choice_question   92286550
Which algorithm will Windows use by default when a user intends to encrypt files and folders in an NTFS volume?
 
exact_answer none 55451
Correct!
 
exact_answer none 50267
 
exact_answer none 80201
 
exact_answer none 69876

Refer to curriculum topic: 4.1.4
Encryption is an important technology used to protect confidentiality. It is important to understand the characteristics of the various encryption methodologies.

 
Question 18
2 / 2 pts
0 multiple_choice_question   92286557
Which access control should the IT department use to restore a system back to its normal state?
Correct!
 
exact_answer none 47182
 
exact_answer none 43983
 
exact_answer none 62451
 
exact_answer none 96591

Refer to curriculum topic: 4.2.7
Access control prevents an unauthorized user from gaining access to sensitive data and networked systems. There are several technologies used to implement effective access control strategies.

 
Question 19
2 / 2 pts
0 multiple_choice_question   92286556
The IT department is tasked to implement a system that controls what a user can and cannot do on the corporate network. Which process should be implemented to meet the requirement?
 
exact_answer none 38692
 
exact_answer none 81226
 
exact_answer none 5583
Correct!
 
exact_answer none 82831

Refer to curriculum topic: 4.2.5
Access control prevents unauthorized user from gaining access to sensitive data and networked systems. There are several technologies used to implement effective access control strategies.

 
Question 20
2 / 2 pts
0 multiple_choice_question   92286552
Smart cards and biometrics are considered to be what type of access control?
Correct!
 
exact_answer none 39289
 
exact_answer none 77432
 
exact_answer none 25033
 
exact_answer none 27761

Refer to curriculum topic: 4.2.1
Access control prevents an unauthorized user from gaining access to sensitive data and networked systems. There are several technologies used to implement effective access control strategies.

 
Question 21
2 / 2 pts
0 multiple_choice_question   92286549
A user has a large amount of data that needs to be kept confidential. Which algorithm would best meet this requirement?
 
exact_answer none 51272
 
exact_answer none 66704
Correct!
 
exact_answer none 4074
 
exact_answer none 53860

Refer to curriculum topic: 4.1.4
Encryption is an important technology used to protect confidentiality. It is important to understand the characteristics of the various encryption methodologies.

 
Question 22
2 / 2 pts
0 multiple_choice_question   92286545
What is the most difficult part of designing a cryptosystem?
 
exact_answer none 87885
 
exact_answer none 6626
 
exact_answer none 48569
Correct!
 
exact_answer none 24130

Refer to curriculum topic: 4.1.1
Encryption is an important technology used to protect confidentiality. It is important to understand the characteristics of the various encryption methodologies.

 
Question 23
2 / 2 pts
0 multiple_choice_question   92286558
In which situation would a detective control be warranted?
 
exact_answer none 43197
 
exact_answer none 31871
Correct!
 
exact_answer none 65450
 
exact_answer none 39195

Refer to curriculum topic: 4.2.7
Access control prevents an unauthorized user from gaining access to sensitive data and networked systems. There are several technologies used to implement effective access control strategies.

 
Question 24
2 / 2 pts
0 multiple_choice_question   92286736
Alice and Bob are using a digital signature to sign a document. What key should Alice use to sign the document so that Bob can make sure that the document came from Alice?
 
exact_answer none 40025
Correct!
 
exact_answer none 3883
 
exact_answer none 20394
 
exact_answer none 21095

Refer to curriculum topic: 5.2.2
Alice and Bob are used to explain asymmetric cryptography used in digital signatures. Alice uses a private key to encrypt the message digest. The message, encrypted message digest, and the public key are used to create the signed document and prepare it for transmission.

 
Question 25
2 / 2 pts
0 multiple_answers_question   92286731
An organization has determined that an employee has been cracking passwords on administrative accounts in order to access very sensitive payroll information. Which tools would you look for on the system of the employee? (Choose three)
Correct!
 
exact_answer none 25777
 
exact_answer none 81302
Correct!
 
exact_answer none 73082
 
exact_answer none 98324
 
exact_answer none 71195
Correct!
 
exact_answer none 5587

Refer to curriculum topic: 5.1.2
Tables that contain possible password combinations are used to crack passwords.

 
Question 26
2 / 2 pts
0 multiple_choice_question   92286737
What technology should be implemented to verify the identity of an organization, to authenticate its website, and to provide an encrypted connection between a client and the website?
 
exact_answer none 43980
Correct!
 
exact_answer none 36080
 
exact_answer none 93230
 
exact_answer none 35303

Refer to curriculum topic: 5.2.2
Encryption is an important technology used to protect confidentiality. It is important to understand the characteristics of the various encryption methodologies.

 
Question 27
2 / 2 pts
0 multiple_choice_question   92286726
What is a feature of a cryptographic hash function?
 
exact_answer none 67325
 
exact_answer none 14676
Correct!
 
exact_answer none 62388
 
exact_answer none 83685

Refer to curriculum topic: 5.1.1
Data integrity is one of the three guiding security principles. A cybersecurity specialist should be familiar with the tools and technologies used to ensure data integrity.

 
Question 28
2 / 2 pts
0 multiple_choice_question   92286729
What technique creates different hashes for the same password?
 
exact_answer none 4609
 
exact_answer none 20917
Correct!
 
exact_answer none 79057
 
exact_answer none 79936

Refer to curriculum topic: 5.1.2
Data integrity is one of the three guiding security principles. A cybersecurity specialist should be familiar with the tools and technologies used ensure data integrity.

 
Question 29
2 / 2 pts
0 multiple_choice_question   92286740
An organization just completed a security audit. Your division was cited for not conforming to X.509 requirements. What is the first security control you need to examine?
 
exact_answer none 65933
Correct!
 
exact_answer none 99666
 
exact_answer none 81483
 
exact_answer none 96569

Refer to curriculum topic: 5.3.2
Digital certificates protect the parties involved in secure communications.

 
Question 30
2 / 2 pts
0 multiple_choice_question   92286741
What kind of integrity does a database have when all its rows have a unique identifier called a primary key?
Correct!
 
exact_answer none 16130
 
exact_answer none 73535
 
exact_answer none 16832
 
exact_answer none 38294

Refer to curriculum topic: 5.4.1
Data integrity is one of the three guiding security principles. A cybersecurity specialist should be familiar with the tools and technologies that are used to ensure data integrity.

 
Question 31
2 / 2 pts
0 multiple_choice_question   92286742
You have been asked to work with the data collection and entry staff in your organization in order to improve data integrity during initial data entry and data modification operations. Several staff members ask you to explain why the new data entry screens limit the types and size of data able to be entered in specific fields. What is an example of a new data integrity control?
 
exact_answer none 97812
Correct!
 
exact_answer none 503
 
exact_answer none 24878
 
exact_answer none 35534

Refer to curriculum topic: 5.4.2
Data integrity deals with data validation.

 
Question 32
2 / 2 pts
0 multiple_choice_question   92286647
What is it called when an organization only installs applications that meet its guidelines, and administrators increase security by eliminating all other applications?
 
exact_answer none 10020
 
exact_answer none 27193
Correct!
 
exact_answer none 31662
 
exact_answer none 59107

Refer to curriculum topic: 6.2.1
An organization needs to know what hardware and software are present as a prerequisite to knowing what the configuration parameters need to be. Asset management includes a complete inventory of hardware and software. Asset standards identify specific hardware and software products that the organization uses and supports. When a failure occurs, prompt action helps to maintain both access and security.

 
Question 33
2 / 2 pts
0 multiple_choice_question   92286643
An organization has recently adopted a five nines program for two critical database servers. What type of controls will this involve?
 
exact_answer none 61790
Correct!
 
exact_answer none 23087
 
exact_answer none 69424
 
exact_answer none 96893

Refer to curriculum topic: 6.1.1
System and data availability is a critical responsibility of a cybersecurity specialists. It is important to understand the technologies, process, and controls used to provide high availability.

 
Question 34
2 / 2 pts
0 multiple_choice_question   92286653
What approach to availability provides the most comprehensive protection because multiple defenses coordinate together to prevent attacks?
 
exact_answer none 98490
 
exact_answer none 33257
Correct!
 
exact_answer none 88806
 
exact_answer none 37349

Refer to curriculum topic: 6.2.2
Defense in depth utilizes multiple layers of security controls.

 
Question 35
2 / 2 pts
0 multiple_choice_question   92286654
What approach to availability involves using file permissions?
 
exact_answer none 89309
 
exact_answer none 9817
Correct!
 
exact_answer none 10480
 
exact_answer none 35882

Refer to curriculum topic: 6.2.2
System and data availability is a critical responsibility of a cybersecurity specialist. It is important to understand the technologies, process, and controls used to protect provide high availability.

 
Question 36
2 / 2 pts
0 multiple_answers_question   92286656
What are two incident response phases? (Choose two.)
 
exact_answer none 55032
Correct!
 
exact_answer none 60456
Correct!
 
exact_answer none 12048
 
exact_answer none 70052
 
exact_answer none 99131
 
exact_answer none 68565

Refer to curriculum topic: 6.3.1
When an incident occurs, the organization must know how to respond. An organization needs to develop an incident response plan that includes several phases.

 
Question 37
2 / 2 pts
0 multiple_choice_question   92286645
Being able to maintain availability during disruptive events describes which of the principles of high availability?
 
exact_answer none 69220
 
exact_answer none 45033
Correct!
 
exact_answer none 64741
 
exact_answer none 28280

Refer to curriculum topic: 6.1.1
High availability can be achieved by eliminating or reducing single points of failure, by implementing system resiliency, and by designing for fault tolerance.

 
Question 38
2 / 2 pts
0 multiple_choice_question   92286648
The team is in the process of performing a risk analysis on the database services. The information collected includes the initial value of these assets, the threats to the assets and the impact of the threats. What type of risk analysis is the team performing by calculating the annual loss expectancy?
 
exact_answer none 98125
 
exact_answer none 22773
 
exact_answer none 12011
Correct!
 
exact_answer none 91085

Refer to curriculum topic: 6.2.1
A qualitative or quantitative risk analysis is used to identify and prioritize threats to the organization.

 
Question 39
2 / 2 pts
0 multiple_choice_question   92286655
Which technology would you implement to provide high availability for data storage?
Correct!
 
exact_answer none 32897
 
exact_answer none 99653
 
exact_answer none 17188
 
exact_answer none 81374

Refer to curriculum topic: 6.2.3
System and data availability is a critical responsibility of a cybersecurity specialist. It is important to understand the technologies, process, and controls used to provide redundancy.

 
Question 40
2 / 2 pts
0 multiple_choice_question   92286646
An organization wants to adopt a labeling system based on the value, sensitivity, and criticality of the information. What element of risk management is recommended?
 
exact_answer none 51432
Correct!
 
exact_answer none 63134
 
exact_answer none 32235
 
exact_answer none 51919

Refer to curriculum topic: 6.2.1
One of the most important steps in risk management is asset classification.

 
Question 41
2 / 2 pts
0 multiple_choice_question   92286715
Which of the following products or technologies would you use to establish a baseline for an operating system?
 
exact_answer none 452
 
exact_answer none 58321
Correct!
 
exact_answer none 82851
 
exact_answer none 78633

Refer to curriculum topic: 7.1.1
There are many tools that a cybersecurity specialist uses to evaluate  the potential vulnerabilities of an organization.

 
Question 42
2 / 2 pts
0 multiple_answers_question   92286721
Which three protocols can use Advanced Encryption Standard (AES)? (Choose three.)
Correct!
 
exact_answer none 6810
Correct!
 
exact_answer none 1793
 
exact_answer none 57678
Correct!
 
exact_answer none 23875
 
exact_answer none 93477
 
exact_answer none 8016

Refer to curriculum topic: 7.3.1
Various protocols can be used to provide secure communication systems. AES is the strongest encryption algorithm.

 
Question 43
2 / 2 pts
0 multiple_choice_question   92286717
Mutual authentication can prevent which type of attack?
 
exact_answer none 24867
Correct!
 
exact_answer none 62942
 
exact_answer none 53365
 
exact_answer none 61334

Refer to curriculum topic: 7.1.2
A cybersecurity specialist must be aware of the technologies and measures that are used as countermeasures to protect the organization from threats and vulnerabilities.

 
Question 44
2 / 2 pts
0 multiple_choice_question   92286725
In a comparison of biometric systems, what is the crossover error rate?
 
exact_answer none 8121
Correct!
 
exact_answer none 48268
 
exact_answer none 51740
 
exact_answer none 2377

Refer to curriculum topic: 7.4.1
In comparing biometric systems, there are several important factors to consider including accuracy, speed or throughput rate, and acceptability to users.

 
Question 45
2 / 2 pts
0 multiple_choice_question   92286724
What describes the protection provided by a fence that is 1 meter in height?
 
exact_answer none 55358
Correct!
 
exact_answer none 16317
 
exact_answer none 22318
 
exact_answer none 82412

Refer to curriculum topic: 7.4.1
Security standards have been developed to assist organizations in implementing the proper controls to mitigate potential threats. The height of a fence determines the level of protection from intruders

 
Question 46
2 / 2 pts
0 multiple_choice_question   92286716
Which wireless standard made AES and CCM mandatory?
 
exact_answer none 33922
Correct!
 
exact_answer none 85722
 
exact_answer none 30441
 
exact_answer none 28340

Refer to curriculum topic: 7.1.2
Wireless security depends on several industry standards and has progressed from WEP to WPA and finally WPA2.

 
Question 47
2 / 2 pts
0 multiple_choice_question   92286720
Which utility uses the Internet Control Messaging Protocol (ICMP)?
 
exact_answer none 83458
 
exact_answer none 84718
 
exact_answer none 39797
Correct!
 
exact_answer none 68360

Refer to curriculum topic: 7.3.1
ICMP is used by network devices to send error messages.

 
Question 48
2 / 2 pts
0 multiple_choice_question   92286711
Which law was enacted to prevent corporate accounting-related crimes?
 
exact_answer none 88511
 
exact_answer none 44091
Correct!
 
exact_answer none 36544
 
exact_answer none 72581

Refer to curriculum topic: 8.2.2
New laws and regulations have come about to protect organizations, citizens, and nations from cybersecurity attacks.

 
Question 49
2 / 2 pts
0 multiple_choice_question   92286710
HVAC, water system, and fire systems fall under which of the cybersecurity domains?
 
exact_answer none 17510
 
exact_answer none 2932
 
exact_answer none 85202
Correct!
 
exact_answer none 47097

Refer to curriculum topic: 8.1.6
Cybersecurity domains provide a framework for evaluating and implementing controls to protect the assets of an organization.

 
Question 50
2 / 2 pts
0 multiple_choice_question   92286713
Which cybersecurity weapon scans for use of default passwords, missing patches, open ports, misconfigurations, and active IP addresses?
 
exact_answer none 14429
 
exact_answer none 43229
 
exact_answer none 91751
Correct!
 
exact_answer none 95208

Refer to curriculum topic: 8.2.4
There are many tools that a cybersecurity specialist uses to evaluate the potential vulnerabilities of an organization.

 
Question 1
2 / 2 pts
0 multiple_choice_question   92286750
Which type of cybercriminal attack would interfere with established network communication through the use of constructed packets so that the packets look like they are part of the normal communication?
 
exact_answer none 14789
 
exact_answer none 44556
 
exact_answer none 83382
 
exact_answer none 75314

Refer to curriculum topic: 1.3.1
Cybersecurity specialists need to be familiar with the characteristics of various attacks.

 
Question 2
2 / 2 pts
0 multiple_answers_question   92286744
Technologies like GIS and IoE contribute to the growth of large data stores. What are two reasons that these technologies increase the need for cybersecurity specialists? (Choose two.)
 
exact_answer none 96402
 
exact_answer none 32956
 
exact_answer none 8084
 
exact_answer none 30307
 
exact_answer none 11967
 
exact_answer none 80377

Refer to curriculum topic: 1.1.1
The types of information collected by these technologies have increased the need for data protection.

 
Question 3
2 / 2 pts
0 multiple_choice_question   92286746
Which type of cybercriminal is the most likely to create malware to compromise an organization by stealing credit card information?
 
exact_answer none 37538
 
exact_answer none 91491
 
exact_answer none 21723
 
exact_answer none 65878

Refer to curriculum topic: 1.2.1
Malware is a tool used by certain types of hackers to steal information.

 
Question 4
2 / 2 pts
0 multiple_choice_question   92286595
Which technology can be implemented as part of an authentication system to verify the identification of employees?
 
exact_answer none 12453
 
exact_answer none 85921
 
exact_answer none 69622
 
exact_answer none 68032

Refer to curriculum topic: 2.2.1
A cybersecurity specialist must be aware of the technologies available that support the CIA triad.

 
Question 5
2 / 2 pts
0 multiple_choice_question   92286593
A cybersecurity specialist is working with the IT staff to establish an effective information security plan. Which combination of security principles forms the foundation of a security plan?
 
exact_answer none 99490
 
exact_answer none 91164
 
exact_answer none 92208
 
exact_answer none 52914

Refer to curriculum topic: 2.1.1
The CIA Triad is the foundation upon which all information management systems are developed.

 
Question 6
2 / 2 pts
0 multiple_choice_question   92286600
An organization allows employees to work from home two days a week. Which technology should be implemented to ensure data confidentiality as data is transmitted?
 
exact_answer none 53829
 
exact_answer none 4789
 
exact_answer none 79490
 
exact_answer none 96148

Refer to curriculum topic: 2.4.1
Protecting data confidentiality requires an understanding of the technologies used to protect data in all three data states.

 
Question 7
2 / 2 pts
0 multiple_choice_question   92286594
Which technology can be used to ensure data confidentiality?
 
exact_answer none 51883
 
exact_answer none 58286
 
exact_answer none 42673
 
exact_answer none 55479

Refer to curriculum topic: 2.2.1
A cybersecurity specialist must be aware of the technologies available which support the CIA triad.

 
Question 8
2 / 2 pts
0 multiple_choice_question   92286599
Which type of networks poses increasing challenges to cybersecurity specialists due to the growth of BYOD on campus?
 
exact_answer none 18187
 
exact_answer none 55542
 
exact_answer none 86121
 
exact_answer none 51658

Refer to curriculum topic: 2.3.2
A cybersecurity specialist must be familiar with the types of technologies used to store, transmit, and process data.

 
Question 9
2 / 2 pts
0 multiple_choice_question   92286695
Users report that the network access is slow. After questioning the employees, the network administrator learned that one employee downloaded a third-party scanning program for the printer. What type of malware might be introduced that causes slow performance of the network?
 
exact_answer none 21785
 
exact_answer none 81572
 
exact_answer none 35560
 
exact_answer none 2921

Refer to curriculum topic: 3.1.1
A cybersecurity specialist needs to be familiar with the characteristics of the different types of malware and attacks that threaten an organization.

 
Question 10
2 / 2 pts
0 multiple_choice_question   92286705
What is an impersonation attack that takes advantage of a trusted relationship between two systems?
 
exact_answer none 94225
 
exact_answer none 49764
 
exact_answer none 9909
 
exact_answer none 56036

Refer to curriculum topic: 3.3.1
A cybersecurity specialist needs to be familiar with the characteristics of the different types of malware and attacks that threaten an organization.

 
Question 11
2 / 2 pts
0 multiple_choice_question   92286706
A cyber criminal sends a series of maliciously formatted packets to the database server. The server cannot parse the packets and the event causes the server crash. What is the type of attack the cyber criminal launches?
 
exact_answer none 68230
 
exact_answer none 91119
 
exact_answer none 3614
 
exact_answer none 17540

Refer to curriculum topic: 3.3.1
A cybersecurity specialist needs to be familiar with the characteristics of the different types of malware and attacks that threaten an organization.

 
Question 12
2 / 2 pts
0 multiple_choice_question   92286704
What type of attack has an organization experienced when an employee installs an unauthorized device on the network to view network traffic?
 
exact_answer none 72363
 
exact_answer none 25631
 
exact_answer none 47265
 
exact_answer none 17241

Refer to curriculum topic: 3.3.1
A cybersecurity specialist needs to be familiar with the characteristics of the different types of malware and attacks that threaten an organization.

 
Question 13
2 / 2 pts
0 multiple_choice_question   92286708
What type of application attack occurs when data goes beyond the memory areas allocated to the application?
 
exact_answer none 20188
 
exact_answer none 38871
 
exact_answer none 69355
 
exact_answer none 51297

Refer to curriculum topic: 3.3.3
A cybersecurity specialist needs to be familiar with the characteristics of the different types of malware and attacks that threaten an organization.

 
Question 14
2 / 2 pts
0 multiple_answers_question   92286698
What are the two most effective ways to defend against malware? (Choose two.)
 
exact_answer none 7802
 
exact_answer none 40758
 
exact_answer none 53051
 
exact_answer none 42174
 
exact_answer none 68304
 
exact_answer none 93870

Refer to curriculum topic: 3.1.1
A cybersecurity specialist must be aware of the technologies and measures that are used as countermeasures to protect the organization from threats and vulnerabilities.

 
Question 15
2 / 2 pts
0 multiple_choice_question   92286701
An executive manager went to an important meeting. The secretary in the office receives a call from a person claiming that the executive manager is about to give an important presentation but the presentation files are corrupted. The caller sternly recommends that the secretary email the presentation right away to a personal email address. The caller also states that the executive is holding the secretary responsible for the success of this presentation. Which type of social engineering tactic would describe this scenario?
 
exact_answer none 32533
 
exact_answer none 84478
 
exact_answer none 70448
 
exact_answer none 76334

Refer to curriculum topic: 3.2.1
Social engineering uses several different tactics to gain information from victims.

 
Question 16
2 / 2 pts
0 multiple_choice_question   92286546
Alice and Bob use a pre-shared key to exchange a confidential message. If Bob wants to send a confidential message to Carol, what key should he use?
 
exact_answer none 14257
 
exact_answer none 21450
 
exact_answer none 38836
 
exact_answer none 40425

Refer to curriculum topic: 4.1.2
Encryption is an important technology used to protect confidentiality. It is important to understand the characteristics of the various encryption methodologies.

 
Question 17
2 / 2 pts
0 multiple_choice_question   92286551
What happens as the key length increases in an encryption application?
 
exact_answer none 27856
 
exact_answer none 11223
 
exact_answer none 70496
 
exact_answer none 55750

Refer to curriculum topic: 4.1.4
Encryption is an important technology used to protect confidentiality. It is important to understand the characteristics of the various encryption methodologies.

 
Question 18
2 / 2 pts
0 multiple_choice_question   92286560
Before data is sent out for analysis, which technique can be used to replace sensitive data in nonproduction environments to protect the underlying information?
 
exact_answer none 45590
 
exact_answer none 39789
 
exact_answer none 50920
 
exact_answer none 36464

Refer to curriculum topic: 4.3.1
Technologies exist to confuse attackers by changing data and using techniques to hide the original data.

 
Question 19
2 / 2 pts
0 multiple_choice_question   92286559
An organization has implemented antivirus software. What type of security control did the company implement?
 
exact_answer none 2597
 
exact_answer none 84084
 
exact_answer none 21111
 
exact_answer none 16067

Refer to curriculum topic: 4.2.7
A cybersecurity specialist must be aware of the technologies and measures that are used as countermeasures to protect the organization from threats and vulnerabilities.

 
Question 20
2 / 2 pts
0 multiple_choice_question   92286549
A user has a large amount of data that needs to be kept confidential. Which algorithm would best meet this requirement?
 
exact_answer none 51272
 
exact_answer none 53860
 
exact_answer none 66704
 
exact_answer none 4074

Refer to curriculum topic: 4.1.4
Encryption is an important technology used to protect confidentiality. It is important to understand the characteristics of the various encryption methodologies.

 
Question 21
2 / 2 pts
0 multiple_choice_question   92286554
Which access control strategy allows an object owner to determine whether to allow access to the object?
 
exact_answer none 32298
 
exact_answer none 82863
 
exact_answer none 63555
 
exact_answer none 11014

Refer to curriculum topic: 4.2.2
Access control prevents unauthorized user from gaining access to sensitive data and networked systems. There are several technologies used to implement effective access control strategies.

 
Question 22
2 / 2 pts
0 multiple_choice_question   92286556
The IT department is tasked to implement a system that controls what a user can and cannot do on the corporate network. Which process should be implemented to meet the requirement?
 
exact_answer none 38692
 
exact_answer none 81226
 
exact_answer none 82831
 
exact_answer none 5583

Refer to curriculum topic: 4.2.5
Access control prevents unauthorized user from gaining access to sensitive data and networked systems. There are several technologies used to implement effective access control strategies.

 
Question 23
2 / 2 pts
0 multiple_choice_question   92286545
What is the most difficult part of designing a cryptosystem?
 
exact_answer none 87885
 
exact_answer none 6626
 
exact_answer none 48569
 
exact_answer none 24130

Refer to curriculum topic: 4.1.1
Encryption is an important technology used to protect confidentiality. It is important to understand the characteristics of the various encryption methodologies.

 
Question 24
2 / 2 pts
0 multiple_choice_question   92286739
The X.509 standards defines which security technology?
 
exact_answer none 77585
 
exact_answer none 35791
 
exact_answer none 70464
 
exact_answer none 53350

Refer to curriculum topic: 5.3.2
Digital certificates protect the parties involved in a secure communication

 
Question 25
2 / 2 pts
0 multiple_choice_question   92286729
What technique creates different hashes for the same password?
 
exact_answer none 20917
 
exact_answer none 79936
 
exact_answer none 79057
 
exact_answer none 4609

Refer to curriculum topic: 5.1.2
Data integrity is one of the three guiding security principles. A cybersecurity specialist should be familiar with the tools and technologies used ensure data integrity.

 
Question 26
2 / 2 pts
0 multiple_choice_question   92286726
What is a feature of a cryptographic hash function?
 
exact_answer none 83685
 
exact_answer none 62388
 
exact_answer none 14676
 
exact_answer none 67325

Refer to curriculum topic: 5.1.1
Data integrity is one of the three guiding security principles. A cybersecurity specialist should be familiar with the tools and technologies used to ensure data integrity.

 
Question 27
2 / 2 pts
0 multiple_choice_question   92286737
What technology should be implemented to verify the identity of an organization, to authenticate its website, and to provide an encrypted connection between a client and the website?
 
exact_answer none 35303
 
exact_answer none 93230
 
exact_answer none 36080
 
exact_answer none 43980

Refer to curriculum topic: 5.2.2
Encryption is an important technology used to protect confidentiality. It is important to understand the characteristics of the various encryption methodologies.

 
Question 28
2 / 2 pts
0 multiple_choice_question   92286740
An organization just completed a security audit. Your division was cited for not conforming to X.509 requirements. What is the first security control you need to examine?
 
exact_answer none 65933
 
exact_answer none 99666
 
exact_answer none 96569
 
exact_answer none 81483

Refer to curriculum topic: 5.3.2
Digital certificates protect the parties involved in secure communications.

 
Question 29
2 / 2 pts
0 multiple_choice_question   92286734
Which hashing technology requires keys to be exchanged?
 
exact_answer none 63557
 
exact_answer none 27064
 
exact_answer none 89561
 
exact_answer none 37076

Refer to curriculum topic: 5.1.3
The difference between HMAC and hashing is the use of keys.

 
Question 30
2 / 2 pts
0 multiple_choice_question   92286741
What kind of integrity does a database have when all its rows have a unique identifier called a primary key?
 
exact_answer none 16832
 
exact_answer none 16130
 
exact_answer none 73535
 
exact_answer none 38294

Refer to curriculum topic: 5.4.1
Data integrity is one of the three guiding security principles. A cybersecurity specialist should be familiar with the tools and technologies that are used to ensure data integrity.

 
Question 31
2 / 2 pts
0 multiple_choice_question   92286728
You have been asked to implement a data integrity program to protect data files that need to be electronically downloaded by the sales staff. You have decided to use the strongest hashing algorithm available on your systems. Which hash algorithm would you select?
 
exact_answer none 33183
 
exact_answer none 73777
 
exact_answer none 36658
 
exact_answer none 80891

Refer to curriculum topic: 5.1.1
MD5 and SHA are the two most popular hashing algorithms. SHA-256 uses a 256-bit hash, whereas MD5 produces a 128-bit hash value.

 
Question 32
2 / 2 pts
0 multiple_choice_question   92286651
The awareness and identification of vulnerabilities is a critical function of a cybersecurity specialist. Which of the following resources can be used to identify specific details about vulnerabilities?
 
exact_answer none 44269
 
exact_answer none 22684
 
exact_answer none 8472
 
exact_answer none 84122

Refer to curriculum topic: 6.2.1
A cybersecurity specialist needs to be familiar with the resources such as the CVE database, Infragard, and the NIST/NISE framework. All can be used to help plan and implement effective an information security management system.

 
Question 33
2 / 2 pts
0 multiple_choice_question   92286650
Which risk mitigation strategies include outsourcing services and purchasing insurance?
 
exact_answer none 36937
 
exact_answer none 54334
 
exact_answer none 74096
 
exact_answer none 63481

Refer to curriculum topic: 6.2.1
Risk mitigation lessens the exposure of an organization to threats and vulnerabilities by transferring, accepting, avoiding, or taking an action to reduce risk.

 
Question 34
2 / 2 pts
0 multiple_answers_question   92286652
Which two values are required to calculate annual loss expectancy? (Choose two.)
 
exact_answer none 42341
 
exact_answer none 76635
 
exact_answer none 70183
 
exact_answer none 28424
 
exact_answer none 14091
 
exact_answer none 77356

Refer to curriculum topic: 6.2.1
Single loss expectancy, annualized rate of occurrence, and annualized loss expectancy are used in a quantitative risk analysis

 
Question 35
2 / 2 pts
0 multiple_choice_question   92286643
An organization has recently adopted a five nines program for two critical database servers. What type of controls will this involve?
 
exact_answer none 61790
 
exact_answer none 69424
 
exact_answer none 23087
 
exact_answer none 96893

Refer to curriculum topic: 6.1.1
System and data availability is a critical responsibility of a cybersecurity specialists. It is important to understand the technologies, process, and controls used to provide high availability.

 
Question 36
2 / 2 pts
0 multiple_choice_question   92286646
An organization wants to adopt a labeling system based on the value, sensitivity, and criticality of the information. What element of risk management is recommended?
 
exact_answer none 63134
 
exact_answer none 51432
 
exact_answer none 32235
 
exact_answer none 51919

Refer to curriculum topic: 6.2.1
One of the most important steps in risk management is asset classification.

 
Question 37
2 / 2 pts
0 multiple_choice_question   92286654
What approach to availability involves using file permissions?
 
exact_answer none 9817
 
exact_answer none 89309
 
exact_answer none 35882
 
exact_answer none 10480

Refer to curriculum topic: 6.2.2
System and data availability is a critical responsibility of a cybersecurity specialist. It is important to understand the technologies, process, and controls used to protect provide high availability.

 
Question 38
2 / 2 pts
0 multiple_choice_question   92286648
The team is in the process of performing a risk analysis on the database services. The information collected includes the initial value of these assets, the threats to the assets and the impact of the threats. What type of risk analysis is the team performing by calculating the annual loss expectancy?
 
exact_answer none 12011
 
exact_answer none 91085
 
exact_answer none 98125
 
exact_answer none 22773

Refer to curriculum topic: 6.2.1
A qualitative or quantitative risk analysis is used to identify and prioritize threats to the organization.

 
Question 39
2 / 2 pts
0 multiple_choice_question   92286649
Your risk manager just distributed a chart that uses three colors to identify the level of threat to key assets in the information security systems. Red represents high level of risk, yellow represents average level of threat and green represents low level of threat. What type of risk analysis does this chart represent?
 
exact_answer none 91277
 
exact_answer none 32375
 
exact_answer none 57903