Cybersecurity Fundamentals Final Exam - 673 Verified Questions

Page 1


Cybersecurity Fundamentals Final

Exam

Course Introduction

Cybersecurity Fundamentals introduces students to the essential principles and practices of protecting digital information and systems from cyber threats. This course covers core topics such as the basics of computer networks, types of cyber attacks, cryptography, security protocols, risk management, and legal and ethical considerations in cybersecurity. Through a blend of theoretical concepts and practical exercises, students will learn how to identify vulnerabilities, implement defensive strategies, and respond to incidents, preparing them for further study or careers in the rapidly evolving field of cybersecurity.

Recommended Textbook

Hands On Ethical Hacking and Network Defense 2nd Edition by Michael T. Simpson

Available Study Resources on Quizplus

13 Chapters

673 Verified Questions

673 Flashcards

Source URL: https://quizplus.com/study-set/2085

Page 2

Chapter 1: Ethical Hacking Overview

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/41510

Sample Questions

Q1) As a security tester, you can't make a network impenetrable.

A)True

B)False

Answer: True

Q2) accesses a computer system or network without the authorization of the system's owner

Answer: G

Q3) Even though the Certified Information Systems Security Professional (CISSP) certification is not geared toward the technical IT professional, it has become one of the standards for many security professionals.

A)True

B)False

Answer: True

Q4) puts the burden on the tester to find out what technologies the company is using Answer: C

Q5) sometimes employed by companies to perform penetration tests

Answer: I

Q6) Employees of a security company are protected under the company's ____________________ with the client.

Answer: contract

Page 3

To view all questions and flashcards with answers, click on the resource link above.

Chapter 2: Tcpip Concepts Review

Available Study Resources on Quizplus for this Chatper

57 Verified Questions

57 Flashcards

Source URL: https://quizplus.com/quiz/41511

Sample Questions

Q1) the primary protocol used to communicate over the World Wide Web

A)FTP

B)SMTP

C)SNMP

D)SSH

E)HTTP

F)IRC

G)URG

H)SYN

I)PSH

Answer: E

Q2) What steps are involved in TCP's "three-way handshake"?

Answer: 1.Host A sends a TCP packet with the SYN flag set (that is, a SYN packet) to Host B.

2.After receiving the packet, Host B sends Host A its own SYN packet with an ACK flag (a SYN-ACK packet) set.

3.In response to the SYN-ACK packet from Host B, Host A sends Host B a TCP packet with the ACK flag set (an ACK packet).

To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Network and Computer Attacks

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/41512

Sample Questions

Q1) One of the most insidious attacks against networks and home computers worldwide is ____, which disguise themselves as useful computer programs or applications.

A)macro viruses

B)worms

C)spyware programs

D)Trojan programs

Answer: D

Q2) A ____ is a computer program that replicates and propagates itself without having to attach itself to a host.

A)virus

B)Trojan

C)worm

D)shell

Answer: C

Q3) Macro viruses are hard to create.

A)True

B)False

Answer: False

To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Footprinting and Social Engineering

Available Study Resources on Quizplus for this Chatper

51 Verified Questions

51 Flashcards

Source URL: https://quizplus.com/quiz/41513

Sample Questions

Q1) What is "competitive intelligence"?

Q2) Wget is a tool that can be used to retrieve HTTP, HTTPS, and FTP files over the Internet.

A)True

B)False

Q3) The HTTP CONNECT method starts a remote application-layer loopback of the request message.

A)True

B)False

Q4) A(n) ____________________ is a text file generated by a Web server and stored on a user's browser.

Q5) The HTTP ____ method is the same as the GET method, but retrieves only the header information of an HTML document, not the document body.

A)CONNECT

B)PUT

C)POST

D)HEAD

Q6) What is the purpose of a Web bug? How do they relate to or differ from spyware?

Q7) List at least five tools available for footprinting.

Page 6

To view all questions and flashcards with answers, click on the resource link above.

Chapter 5: Port Scanning

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/41514

Sample Questions

Q1) In an ACK scan, if the attacked port returns an RST packet the attacked port is considered to be "____".

A)open

B)closed

C)unfiltered

D)unassigned

Q2) The ____ vi command deletes the current line.

A)d

B)dl

C)dd

D)dw

Q3) Unicornscan optimizes ____ scanning beyond the capabilities of any other port scanner.

A)TCP

B)UDP

C)ICMP

D)IP

Q4) Port scanners can also be used to conduct a(n) ____________________ of a large network to identify which IP addresses belong to active hosts.

To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Enumeration

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/41515

Sample Questions

Q1) replaced the Registry with Active Directory for object storage

A)Windows 98

B)Windows 95

C)Windows Server 2003

D)Fedora Linux

E)Solaris

F)Windows XP Professional

G)Novell Open Enterprise Server

H)Windows 2000 Server/Professional

I)Windows NT 3.51 Server/Workstation

Q2) ____ is a system process that runs on Windows OSs to facilitate the exchange of network data.

A)NetBIOS

B)Active Directory

C)NetDDE

D)IIS

Q3) What is the Net view command and how can you use it?

Q4) Why is enumeration a more intrusive process than port scanning or footprinting?

Q5) List at least eight variations of UNIX.

Q6) What is Hyena and what can it be used for?

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Programming for Security Professionals

Available Study Resources on Quizplus for this Chatper

53 Verified Questions

53 Flashcards

Source URL: https://quizplus.com/quiz/41516

Sample Questions

Q1) The mathematical operator in C that increments the unary value by 1 is ____.

A)+

B)%

C)++

D)&

Q2) Mention three C compilers and on which operating systems they are available.

Q3) In HTML, each tag has a matching closing tag that's written with a(n) ____ added.

A)forward slash (/)

B)backward slash (\)

C)bang (!)

D)ampersand (&)

Q4) The print command for Perl is almost identical to the ____ print command.

A)Java

B)C

C)PHP

D)Smalltalk

Q5) Why is documenting computer programs essential?

Q6) What is a dangerous thing about programming in the C language?

Q7) The HTML ____________________ tag formats text as a level 1 heading.

Page 9

To view all questions and flashcards with answers, click on the resource link above.

Chapter 8: Desktop and Server Os Vulnerabilities

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/41517

Sample Questions

Q1) The MBSA can check for missing security updates.

A)True

B)False

Q2) The MBSA can check for user account passwords that have dictionary words in them.

A)True

B)False

Q3) What should a password policy include?

Q4) Complete instructions for MBSA are available from the MBSA Help interface or the ____ site.

A)Microsoft Security Tools Web

B)Microsoft Knowledge Base

C)Windows Help

D)Windows On-line Help

Q5) What is the Common Internet File System (CIFS) protocol?

Q6) What functions do most Trojan programs perform?

Q7) Why is NetBIOS still used sometimes?

Q8) What is the purpose of a file system?

Q9) You can use

information when testing Linux computers for known vulnerabilities. Page 10

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 9: Embedded Operating Systems: The Hidden Threat

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/41518

Sample Questions

Q1) Why do many people dismiss the topic of embedded device security?

Q2) used for equipment monitoring in large industries

A)Windows Embedded Standard

B)Green Hill Software

C)RTLinux

D)VxWorks

E)RTEMS

F)embedded operating system

G)Quebec

H)QNX

I)SCADA

Q3) Firmware rootkits are hard to detect because the code for firmware often isn't checked for possible corruption.

A)True

B)False

Q4) Why might attackers use social engineering techniques to masquerade as support technicians?

Q5) Attackers cannot map an entire network from a single router.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 10: Hacking Web Servers

Available Study Resources on Quizplus for this Chatper

52 Verified Questions

52 Flashcards

Source URL: https://quizplus.com/quiz/41519

Sample Questions

Q1) What is JavaScript?

Q2) What can an attacker do after gaining control of a Web server?

Q3) To keep attackers from knowing the directory structure you create on an IIS Web server, creating a(n) ____________________ is recommended so that the path a user sees on the Web browser is not the actual path on the Web server.

Q4) What is VBScript?

Q5) All CFML tags begin with "____".

A)(?)

B)CF

C)CFML

D)%

Q6) Connecting to a Microsoft Active Directory Service database with OLE DB requires using ____ as the provider.

A)ADSDSOOBJECT

B)MySQLProv

C)SQLOLEDB

D)SNAOLEDB

Q7) What features does the current version of Wfetch offer?

To view all questions and flashcards with answers, click on the resource link above. Page 13

Q8) What is the main difference between HTML pages and Active Server Pages (ASP)?

Chapter 11: Hacking Wireless Networks

Available Study Resources on Quizplus for this Chatper

52 Verified Questions

52 Flashcards

Source URL: https://quizplus.com/quiz/41520

Sample Questions

Q1) There are measures for preventing radio waves from leaving or entering a building so that wireless technology can be used only by people located in the facility.

A)True

B)False

Q2) Wireless routers are designed so that they do not interfere with wireless telephones.

A)True

B)False

Q3) addresses the issue of wireless metropolitan area networks (MANs)

A)802.16

B)spread spectrum

C)802.11b

D)narrowband

E)802.20

F)infrared (IR)

G)802.1X

H)Bluetooth

I)HiperLAN2

Q4) What is frequency-hopping spread spectrum (FHSS)?

To view all questions and flashcards with answers, click on the resource link above. Page 14

Chapter 12: Cryptography

Available Study Resources on Quizplus for this Chatper

58 Verified Questions

58 Flashcards

Source URL: https://quizplus.com/quiz/41521

Sample Questions

Q1) In a ____ attack, the attacker has the ciphertext of several messages that were encrypted with the same encryption algorithm but has no access to the plaintext, so he or she must try to figure out the key used to encrypt the data.

A)chosen-ciphertext

B)chosen-plaintext

C)known plaintext

D)ciphertext-only

Q2) takes a variable-length input and converts it to a fixed-length output string

A)asymmetric encryption

B)collision free

C)symmetric encryption

D)certificate

E)hashing

F)collision

G)stream cipher

H)message digest

I)block cipher

Q3) Cryptography is the process of converting plaintext, which is readable text, into ____________________, which is unreadable or encrypted text.

To view all questions and flashcards with answers, click on the resource link above.

Page 15

Chapter 13: Network Protection Systems

Available Study Resources on Quizplus for this Chatper

50 Verified Questions

50 Flashcards

Source URL: https://quizplus.com/quiz/41522

Sample Questions

Q1) The ____ of a Cisco router holds the IOS the router is using.

A)RAM

B)NVRAM

C)flash memory

D)ROM

Q2) small network containing resources that a company wants to make available to Internet users

A)stateful packet filter

B)firewall

C)NAT

D)DMZ

E)stateless packet filter

F)user mode

G)enable mode

H)ASA

I)privileged mode

Q3) A standard IP access list is restricted to source IP addresses.

A)True

B)False

Q4) What is a path-vector routing protocol?

Page 16

To view all questions and flashcards with answers, click on the resource link above.

Turn static files into dynamic content formats.

CreateΒ aΒ flipbook