

Cybersecurity Fundamentals Final
Exam
Course Introduction
Cybersecurity Fundamentals introduces students to the essential principles and practices of protecting digital information and systems from cyber threats. This course covers core topics such as the basics of computer networks, types of cyber attacks, cryptography, security protocols, risk management, and legal and ethical considerations in cybersecurity. Through a blend of theoretical concepts and practical exercises, students will learn how to identify vulnerabilities, implement defensive strategies, and respond to incidents, preparing them for further study or careers in the rapidly evolving field of cybersecurity.
Recommended Textbook
Hands On Ethical Hacking and Network Defense 2nd Edition by Michael T. Simpson
Available Study Resources on Quizplus
13 Chapters
673 Verified Questions
673 Flashcards
Source URL: https://quizplus.com/study-set/2085

Page 2
Chapter 1: Ethical Hacking Overview
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/41510
Sample Questions
Q1) As a security tester, you can't make a network impenetrable.
A)True
B)False
Answer: True
Q2) accesses a computer system or network without the authorization of the system's owner
Answer: G
Q3) Even though the Certified Information Systems Security Professional (CISSP) certification is not geared toward the technical IT professional, it has become one of the standards for many security professionals.
A)True
B)False
Answer: True
Q4) puts the burden on the tester to find out what technologies the company is using Answer: C
Q5) sometimes employed by companies to perform penetration tests
Answer: I
Q6) Employees of a security company are protected under the company's ____________________ with the client.
Answer: contract

Page 3
To view all questions and flashcards with answers, click on the resource link above.

Chapter 2: Tcpip Concepts Review
Available Study Resources on Quizplus for this Chatper
57 Verified Questions
57 Flashcards
Source URL: https://quizplus.com/quiz/41511
Sample Questions
Q1) the primary protocol used to communicate over the World Wide Web
A)FTP
B)SMTP
C)SNMP
D)SSH
E)HTTP
F)IRC
G)URG
H)SYN
I)PSH
Answer: E
Q2) What steps are involved in TCP's "three-way handshake"?
Answer: 1.Host A sends a TCP packet with the SYN flag set (that is, a SYN packet) to Host B.
2.After receiving the packet, Host B sends Host A its own SYN packet with an ACK flag (a SYN-ACK packet) set.
3.In response to the SYN-ACK packet from Host B, Host A sends Host B a TCP packet with the ACK flag set (an ACK packet).
To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Network and Computer Attacks
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/41512
Sample Questions
Q1) One of the most insidious attacks against networks and home computers worldwide is ____, which disguise themselves as useful computer programs or applications.
A)macro viruses
B)worms
C)spyware programs
D)Trojan programs
Answer: D
Q2) A ____ is a computer program that replicates and propagates itself without having to attach itself to a host.
A)virus
B)Trojan
C)worm
D)shell
Answer: C
Q3) Macro viruses are hard to create.
A)True
B)False
Answer: False
To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Footprinting and Social Engineering
Available Study Resources on Quizplus for this Chatper
51 Verified Questions
51 Flashcards
Source URL: https://quizplus.com/quiz/41513
Sample Questions
Q1) What is "competitive intelligence"?
Q2) Wget is a tool that can be used to retrieve HTTP, HTTPS, and FTP files over the Internet.
A)True
B)False
Q3) The HTTP CONNECT method starts a remote application-layer loopback of the request message.
A)True
B)False
Q4) A(n) ____________________ is a text file generated by a Web server and stored on a user's browser.
Q5) The HTTP ____ method is the same as the GET method, but retrieves only the header information of an HTML document, not the document body.
A)CONNECT
B)PUT
C)POST
D)HEAD
Q6) What is the purpose of a Web bug? How do they relate to or differ from spyware?
Q7) List at least five tools available for footprinting.
Page 6
To view all questions and flashcards with answers, click on the resource link above.

Chapter 5: Port Scanning
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/41514
Sample Questions
Q1) In an ACK scan, if the attacked port returns an RST packet the attacked port is considered to be "____".
A)open
B)closed
C)unfiltered
D)unassigned
Q2) The ____ vi command deletes the current line.
A)d
B)dl
C)dd
D)dw
Q3) Unicornscan optimizes ____ scanning beyond the capabilities of any other port scanner.
A)TCP
B)UDP
C)ICMP
D)IP
Q4) Port scanners can also be used to conduct a(n) ____________________ of a large network to identify which IP addresses belong to active hosts.
To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Enumeration
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/41515
Sample Questions
Q1) replaced the Registry with Active Directory for object storage
A)Windows 98
B)Windows 95
C)Windows Server 2003
D)Fedora Linux
E)Solaris
F)Windows XP Professional
G)Novell Open Enterprise Server
H)Windows 2000 Server/Professional
I)Windows NT 3.51 Server/Workstation
Q2) ____ is a system process that runs on Windows OSs to facilitate the exchange of network data.
A)NetBIOS
B)Active Directory
C)NetDDE
D)IIS
Q3) What is the Net view command and how can you use it?
Q4) Why is enumeration a more intrusive process than port scanning or footprinting?
Q5) List at least eight variations of UNIX.
Q6) What is Hyena and what can it be used for?
To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Programming for Security Professionals
Available Study Resources on Quizplus for this Chatper
53 Verified Questions
53 Flashcards
Source URL: https://quizplus.com/quiz/41516
Sample Questions
Q1) The mathematical operator in C that increments the unary value by 1 is ____.
A)+
B)%
C)++
D)&
Q2) Mention three C compilers and on which operating systems they are available.
Q3) In HTML, each tag has a matching closing tag that's written with a(n) ____ added.
A)forward slash (/)
B)backward slash (\)
C)bang (!)
D)ampersand (&)
Q4) The print command for Perl is almost identical to the ____ print command.
A)Java
B)C
C)PHP
D)Smalltalk
Q5) Why is documenting computer programs essential?
Q6) What is a dangerous thing about programming in the C language?
Q7) The HTML ____________________ tag formats text as a level 1 heading.
Page 9
To view all questions and flashcards with answers, click on the resource link above.

Chapter 8: Desktop and Server Os Vulnerabilities
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/41517
Sample Questions
Q1) The MBSA can check for missing security updates.
A)True
B)False
Q2) The MBSA can check for user account passwords that have dictionary words in them.
A)True
B)False
Q3) What should a password policy include?
Q4) Complete instructions for MBSA are available from the MBSA Help interface or the ____ site.
A)Microsoft Security Tools Web
B)Microsoft Knowledge Base
C)Windows Help
D)Windows On-line Help
Q5) What is the Common Internet File System (CIFS) protocol?
Q6) What functions do most Trojan programs perform?
Q7) Why is NetBIOS still used sometimes?
Q8) What is the purpose of a file system?
Q9) You can use
information when testing Linux computers for known vulnerabilities. Page 10
To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 9: Embedded Operating Systems: The Hidden Threat
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/41518
Sample Questions
Q1) Why do many people dismiss the topic of embedded device security?
Q2) used for equipment monitoring in large industries
A)Windows Embedded Standard
B)Green Hill Software
C)RTLinux
D)VxWorks
E)RTEMS
F)embedded operating system
G)Quebec
H)QNX
I)SCADA
Q3) Firmware rootkits are hard to detect because the code for firmware often isn't checked for possible corruption.
A)True
B)False
Q4) Why might attackers use social engineering techniques to masquerade as support technicians?
Q5) Attackers cannot map an entire network from a single router.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 10: Hacking Web Servers
Available Study Resources on Quizplus for this Chatper
52 Verified Questions
52 Flashcards
Source URL: https://quizplus.com/quiz/41519
Sample Questions
Q1) What is JavaScript?
Q2) What can an attacker do after gaining control of a Web server?
Q3) To keep attackers from knowing the directory structure you create on an IIS Web server, creating a(n) ____________________ is recommended so that the path a user sees on the Web browser is not the actual path on the Web server.
Q4) What is VBScript?
Q5) All CFML tags begin with "____".
A)(?)
B)CF
C)CFML
D)%
Q6) Connecting to a Microsoft Active Directory Service database with OLE DB requires using ____ as the provider.
A)ADSDSOOBJECT
B)MySQLProv
C)SQLOLEDB
D)SNAOLEDB
Q7) What features does the current version of Wfetch offer?
To view all questions and flashcards with answers, click on the resource link above. Page 13
Q8) What is the main difference between HTML pages and Active Server Pages (ASP)?

Chapter 11: Hacking Wireless Networks
Available Study Resources on Quizplus for this Chatper
52 Verified Questions
52 Flashcards
Source URL: https://quizplus.com/quiz/41520
Sample Questions
Q1) There are measures for preventing radio waves from leaving or entering a building so that wireless technology can be used only by people located in the facility.
A)True
B)False
Q2) Wireless routers are designed so that they do not interfere with wireless telephones.
A)True
B)False
Q3) addresses the issue of wireless metropolitan area networks (MANs)
A)802.16
B)spread spectrum
C)802.11b
D)narrowband
E)802.20
F)infrared (IR)
G)802.1X
H)Bluetooth
I)HiperLAN2
Q4) What is frequency-hopping spread spectrum (FHSS)?
To view all questions and flashcards with answers, click on the resource link above. Page 14

Chapter 12: Cryptography
Available Study Resources on Quizplus for this Chatper
58 Verified Questions
58 Flashcards
Source URL: https://quizplus.com/quiz/41521
Sample Questions
Q1) In a ____ attack, the attacker has the ciphertext of several messages that were encrypted with the same encryption algorithm but has no access to the plaintext, so he or she must try to figure out the key used to encrypt the data.
A)chosen-ciphertext
B)chosen-plaintext
C)known plaintext
D)ciphertext-only
Q2) takes a variable-length input and converts it to a fixed-length output string
A)asymmetric encryption
B)collision free
C)symmetric encryption
D)certificate
E)hashing
F)collision
G)stream cipher
H)message digest
I)block cipher
Q3) Cryptography is the process of converting plaintext, which is readable text, into ____________________, which is unreadable or encrypted text.
To view all questions and flashcards with answers, click on the resource link above.
Page 15

Chapter 13: Network Protection Systems
Available Study Resources on Quizplus for this Chatper
50 Verified Questions
50 Flashcards
Source URL: https://quizplus.com/quiz/41522
Sample Questions
Q1) The ____ of a Cisco router holds the IOS the router is using.
A)RAM
B)NVRAM
C)flash memory
D)ROM
Q2) small network containing resources that a company wants to make available to Internet users
A)stateful packet filter
B)firewall
C)NAT
D)DMZ
E)stateless packet filter
F)user mode
G)enable mode
H)ASA
I)privileged mode
Q3) A standard IP access list is restricted to source IP addresses.
A)True
B)False
Q4) What is a path-vector routing protocol?
Page 16
To view all questions and flashcards with answers, click on the resource link above.