Final Quiz - Cybersecurity Essentials
Final Quiz - Cybersecurity Essentials
Final Quiz
Due No due date Points 100 Questions 50 Time Limit 60 Minutes
Allowed Attempts 2
Instruc ons
This quiz covers all of the content in Cybersecurity Essentials 1.1. It is designed to test the skills and
knowledge presented in the course.
There are multiple task types that may be available in this quiz.
NOTE: Quizzes allow for partial credit scoring on all item types to foster learning. Points on quizzes can
also be deducted for answering incorrectly.
Forms 32901 - 23908
A empt History
Attempt Time Score
LATEST Attempt 1 28 minutes 94 out of 100
Question 1 2 / 2 pts
https://626763797.netacad.com/courses/690577/quizzes/6131638 1/32
7/20/2018 Final Quiz: Cybersecurity Essentials
Question 2 2 / 2 pts
script kiddies
Question 3 2 / 2 pts
Correct!
high earning potential
Question 4 2 / 2 pts
SHS
VLANS
RAID
Correct!
VPN
https://626763797.netacad.com/courses/690577/quizzes/6131638 3/32
7/20/2018 Final Quiz: Cybersecurity Essentials
Question 5 2 / 2 pts
Correct!
wireless networks
wired networks
sneaker net
virtual networks
Question 6 2 / 2 pts
Correct!
confidentiality, integrity, and availability
https://626763797.netacad.com/courses/690577/quizzes/6131638 4/32
7/20/2018 Final Quiz: Cybersecurity Essentials
Question 7 2 / 2 pts
Correct!
ISO/IEC 27000
NIST/NICE framework
CIA Triad
Question 8 2 / 2 pts
What are three states of data during which data is vulnerable? (Choose
three.)
Correct!
data in-process
Correct!
stored data
https://626763797.netacad.com/courses/690577/quizzes/6131638 5/32
7/20/2018 Final Quiz: Cybersecurity Essentials
Correct!
data in-transit
data encrypted
purged data
data decrypted
Question 9 2 / 2 pts
Users report that the database on the main server cannot be accessed. A
database administrator verifies the issue and notices that the database file is
now encrypted. The organization receives a threatening email demanding
payment for the decryption of the database file. What type of attack has the
organization experienced?
man-in-the-middle attack
Correct!
ransomeware
Trojan horse
DoS attack
https://626763797.netacad.com/courses/690577/quizzes/6131638 6/32
7/20/2018 Final Quiz: Cybersecurity Essentials
Question 10 2 / 2 pts
What three best practices can help defend against social engineering
attacks? (Choose three.)
Enable a policy that states that the IT department should supply information
over the phone only to managers.
Correct!
Resist the urge to click on enticing web links.
Correct!
Educate employees regarding policies.
Correct!
Do not provide password resets in a chat window.
Question 11 2 / 2 pts
https://626763797.netacad.com/courses/690577/quizzes/6131638 7/32
7/20/2018 Final Quiz: Cybersecurity Essentials
Correct!
An attacker builds a botnet comprised of zombies.
One computer accepts data packets based on the MAC address of another
computer.
Question 12 2 / 2 pts
Correct!
DoS
man-in-the-middle
packet Injection
SQL injection
https://626763797.netacad.com/courses/690577/quizzes/6131638 8/32
7/20/2018 Final Quiz: Cybersecurity Essentials
Question 13 0 / 2 pts
familiarity
trusted partners
Question 14 2 / 2 pts
https://626763797.netacad.com/courses/690577/quizzes/6131638 9/32
7/20/2018 Final Quiz: Cybersecurity Essentials
What are the two most effective ways to defend against malware? (Choose
two.)
Implement RAID.
Implement a VPN.
Question 15 2 / 2 pts
It is a piggy-back attack.
It is an impersonation attack.
It is a DDoS attack.
Correct! It is a hoax.
https://626763797.netacad.com/courses/690577/quizzes/6131638 10/32
7/20/2018 Final Quiz: Cybersecurity Essentials
Question 16 2 / 2 pts
Question 17 2 / 2 pts
https://626763797.netacad.com/courses/690577/quizzes/6131638 11/32
7/20/2018 Final Quiz: Cybersecurity Essentials
deterrent control
detective control
compensative control
Question 18 2 / 2 pts
Alice and Bob are using public key encryption to exchange a message.
Which key should Alice use to encrypt a message to Bob?
https://626763797.netacad.com/courses/690577/quizzes/6131638 12/32
7/20/2018 Final Quiz: Cybersecurity Essentials
Question 19 2 / 2 pts
Correct!
Block ciphers result in output data that is larger than the input data most of the
time.
Question 20 2 / 2 pts
https://626763797.netacad.com/courses/690577/quizzes/6131638 13/32
7/20/2018 Final Quiz: Cybersecurity Essentials
Question 21 2 / 2 pts
Question 22 2 / 2 pts
RBAC
https://626763797.netacad.com/courses/690577/quizzes/6131638 14/32
7/20/2018 Final Quiz: Cybersecurity Essentials
Correct! DAC
MAC
ACL
Question 23 2 / 2 pts
data obfuscation
data masking
Question 24 2 / 2 pts
https://626763797.netacad.com/courses/690577/quizzes/6131638 15/32
7/20/2018 Final Quiz: Cybersecurity Essentials
Correct!
digital certificates
biometrics
strong passwords
security tokens
Question 25 2 / 2 pts
MD5
AES-256
3DES
Correct!
SHA-256
https://626763797.netacad.com/courses/690577/quizzes/6131638 16/32
7/20/2018 Final Quiz: Cybersecurity Essentials
Question 26 2 / 2 pts
Correct!
The systems use different hashing algorithms.
Correct!
One system uses hashing and the other uses hashing and salting.
One system uses symmetrical hashing and the other uses asymmetrical
hashing.
Question 27 0 / 2 pts
You have been asked to work with the data collection and entry staff in your
organization in order to improve data integrity during initial data entry and
data modification operations. Several staff members ask you to explain why
the new data entry screens limit the types and size of data able to be entered
in specific fields. What is an example of a new data integrity control?
https://626763797.netacad.com/courses/690577/quizzes/6131638 17/32
7/20/2018 Final Quiz: Cybersecurity Essentials
You Answered
data entry controls which only allow entry staff to view current data
orrect Answer
a validation rule which has been implemented to ensure completeness,
accuracy, and consistency of data
Question 28 0 / 2 pts
You Answered
digital signature
salting
asymmetric encryption
https://626763797.netacad.com/courses/690577/quizzes/6131638 18/32
7/20/2018 Final Quiz: Cybersecurity Essentials
Question 29 2 / 2 pts
data hashing
asymmetrical encryption
symmetrical encryption
Correct!
digital certificates
Question 30 2 / 2 pts
Alice and Bob are using a digital signature to sign a document. What key
should Alice use to sign the document so that Bob can make sure that the
document came from Alice?
https://626763797.netacad.com/courses/690577/quizzes/6131638 19/32
7/20/2018 Final Quiz: Cybersecurity Essentials
Correct!
private key from Alice
Question 31 2 / 2 pts
Correct!
rainbow tables
Correct!
lookup tables
algorithm tables
password digest
Correct!
reverse lookup tables
https://626763797.netacad.com/courses/690577/quizzes/6131638 20/32
7/20/2018 Final Quiz: Cybersecurity Essentials
Question 32 2 / 2 pts
Correct!
asset classification
asset identification
asset availability
asset standardization
Question 33 2 / 2 pts
An organization has recently adopted a five nines program for two critical
database servers. What type of controls will this involve?
Correct!
improving reliability and uptime of the servers
https://626763797.netacad.com/courses/690577/quizzes/6131638 21/32
7/20/2018 Final Quiz: Cybersecurity Essentials
Question 34 2 / 2 pts
Correct!
system resiliency
fault tolerance
uninterruptible services
Question 35 2 / 2 pts
https://626763797.netacad.com/courses/690577/quizzes/6131638 22/32
7/20/2018 Final Quiz: Cybersecurity Essentials
avoidance
Correct!
transfer
reduction
acceptance
Question 36 2 / 2 pts
Correct!
CVE national database
NIST/NICE framework
Infragard
https://626763797.netacad.com/courses/690577/quizzes/6131638 23/32
7/20/2018 Final Quiz: Cybersecurity Essentials
Question 37 2 / 2 pts
Which technology would you implement to provide high availability for data
storage?
N+1
software updates
Correct!
RAID
hot standby
Question 38 2 / 2 pts
Which two values are required to calculate annual loss expectancy? (Choose
two.)
Correct!
annual rate of occurrence
https://626763797.netacad.com/courses/690577/quizzes/6131638 24/32
7/20/2018 Final Quiz: Cybersecurity Essentials
asset value
frequency factor
exposure factor
Question 39 2 / 2 pts
What is it called when an organization only installs applications that meet its
guidelines, and administrators increase security by eliminating all other
applications?
asset availability
asset identification
asset classification
https://626763797.netacad.com/courses/690577/quizzes/6131638 25/32
7/20/2018 Final Quiz: Cybersecurity Essentials
Question 40 2 / 2 pts
There are many environments that require five nines, but a five nines
environment may be cost prohibitive. What is one example of where the five
nines environment might be cost prohibitive?
Correct!
the New York Stock Exchange
Question 41 2 / 2 pts
ARP
strong authentication
SSH
Question 42 2 / 2 pts
wireless poisoning
wireless IP spoofing
wireless sniffing
Correct! man-in-the-middle
Question 43 2 / 2 pts
https://626763797.netacad.com/courses/690577/quizzes/6131638 27/32
7/20/2018 Final Quiz: Cybersecurity Essentials
Correct!
Microsoft Security Baseline Analyzer
MS Baseliner
Question 44 2 / 2 pts
Computer Management
Correct!
Local Security Policy tool
https://626763797.netacad.com/courses/690577/quizzes/6131638 28/32
7/20/2018 Final Quiz: Cybersecurity Essentials
Question 45 2 / 2 pts
Correct!
It deters casual trespassers only.
Question 46 2 / 2 pts
Correct!
WPA2
https://626763797.netacad.com/courses/690577/quizzes/6131638 29/32
7/20/2018 Final Quiz: Cybersecurity Essentials
WEP
WEP2
WPA
Question 47 2 / 2 pts
WEP
Correct! WPA2
Correct! WPA
802.11q
Correct! 802.11i
TKIP
https://626763797.netacad.com/courses/690577/quizzes/6131638 30/32
7/20/2018 Final Quiz: Cybersecurity Essentials
Question 48 2 / 2 pts
Correct!
The National Vulnerability Database website
CERT
Question 49 2 / 2 pts
Gramm-Leach-Bliley Act
Correct!
Sarbanes-Oxley Act
https://626763797.netacad.com/courses/690577/quizzes/6131638 31/32
7/20/2018 Final Quiz: Cybersecurity Essentials
Question 50 2 / 2 pts
packet analyzers
packet sniffers
password crackers
https://626763797.netacad.com/courses/690577/quizzes/6131638 32/32