Introduction to Cybersecurity: Course Final Exam Quiz Answer | CISCO
Welcome to the Introduction to Cybersecurity final course exam.
In this article, i am gone to Share CISCO Introduction to Cybersecurity Course Final Exam Quiz Answer | CISCO
Final Exam Quiz Answer
Question 1)
An organization is experiencing overwhelming visits to a main web server. You are developing a plan to add a couple of more web servers for load balancing and redundancy.
Which requirement of information security is addressed by implementing the plan?
- Integrity
- Availability
- Scalability
- Confidentiality
Question 2)
What are the objectives of ensuring data integrity?
Choose two correct answers
- Access to the data is authenticated
- Data is available all the time
- Data is unaltered during transit
- Data is encrypted while in transit and when stored on disks
- Data is not changed by unauthorized entities
Question 3)
What is the main purpose of cyberwarfare?
- To develop advanced network devices
- To gain advantage over adversaries
- To protect cloud-based data centers
- To simulate possible war scenarios among nations
Question 4)
What vulnerability occurs when the output of an event depends on ordered or timed outputs?
- Weaknesses in security practices
- Non-validated input
- Race conditions
- Buffer overflow
- Access control problems
Question 5)
What do you call the vulnerabilities discovered by Google security researchers that affect almost all CPUs released since 1995?
Select two correct answers
- Shell shock
- WannaCry
- NotPetva
- Spectre
- Meltdown
Question 6)
If developers attempt to create their own security algorithms, it will likely introduce what type of vulnerabilities?
-
Buffer overflow - Race conditions
- Weaknesses in security practices
-
Non-validated input - Access control problems
Question 7)
A medical office employee sends emails to patients about their recent visits to the facility.
What information would put the privacy of the patients at risk if it was included in the email?
- Patient records
- Next appointment
- First and last name
- Contact information
Question 8)
Which technology creates a security token that allows a user to log in to a desired web application using credentials from a social media website?
- Open authorization
- VPN service
- Password manager
- In-private browsing mode
Question 9
Which of the following security implementations use biometrics?
Choose two correct answers
- Fingerprint
- Phone
- Credit card
- Voice recognition
- Fob
Question 10)
Which of the following firewalls filters traffic based on source and destination IP addresses?
- Network layer firewall
- Proxy server
- Application layer firewall
- Transport layer firewall
- Network address translation firewall
Question 11)
Which of the following firewalls filters web content requests such as URLs and domain names?
- Application layer firewall
- Proxy server
- Reverse proxy server
- Network layer firewall
- Network address translation firewall
Question 12)
A port scan returns a ‘dropped’ response. What does this mean?
-
A service is listening on the port - Connections to the port will be denied
- There was no reply from the host
Question 13
During a meeting with the Marketing department, a representative from IT discusses features of an upcoming product that will be released next year.
Is this employee’s behavior ethical or unethical?
- Ethical
- Unethical
Question 14)
Which of the following is an entry-level certification for newcomers who are preparing to start their career in cybersecurity?
-
CompTIA Security+ - Microsoft Technology Associate Security Fundamentals
- ISC2 Certified Information Systems Security Professional
- ISACA CSX Cybersecurity Fundamentals
-
EC Council Certified Ethical Hacker - Palo Alto Networks Certified Cybersecurity Associate
Question 15)
'Cybersecurity certifications are a way for you to verify your skills and knowledge and can also boost your career.'
Is this statement true or false?
- True
- False
Note: If you Know Answer
Question 6) and Question 14) Please comment..
Introduction to Cybersecurity CISCO Quiz Answer
1 Comments
Nice post bro . Thank you for posting something like this
ReplyDelete