Introduction to Cybersecurity: Course Final Exam Quiz Answer | CISCO

Introduction to Cybersecurity Course Final Exam Quiz Answer  CISCO

Introduction to Cybersecurity: Course Final Exam Quiz Answer | CISCO

Welcome to the Introduction to Cybersecurity final course exam.

In this article, i am gone to Share CISCO Introduction to Cybersecurity Course Final Exam Quiz Answer | CISCO


Final Exam Quiz Answer 


Question 1)

An organization is experiencing overwhelming visits to a main web server. You are developing a plan to add a couple of more web servers for load balancing and redundancy.

Which requirement of information security is addressed by implementing the plan?


  • Integrity
  • Availability
  • Scalability
  • Confidentiality



Question 2)

What are the objectives of ensuring data integrity?

Choose two correct answers


  • Access to the data is authenticated
  • Data is available all the time
  • Data is unaltered during transit
  • Data is encrypted while in transit and when stored on disks
  • Data is not changed by unauthorized entities


Question 3)

What is the main purpose of cyberwarfare?


  • To develop advanced network devices
  • To gain advantage over adversaries
  • To protect cloud-based data centers
  • To simulate possible war scenarios among nations



Question 4)

What vulnerability occurs when the output of an event depends on ordered or timed outputs?


  • Weaknesses in security practices
  • Non-validated input
  • Race conditions
  • Buffer overflow
  • Access control problems



Question 5)

What do you call the vulnerabilities discovered by Google security researchers that affect almost all CPUs released since 1995?

Select two correct answers


  • Shell shock
  • WannaCry
  • NotPetva
  • Spectre
  • Meltdown



Question 6)

If developers attempt to create their own security algorithms, it will likely introduce what type of vulnerabilities?


  • Buffer overflow
  • Race conditions
  • Weaknesses in security practices
  • Non-validated input
  • Access control problems



Question 7)

A medical office employee sends emails to patients about their recent visits to the facility.


What information would put the privacy of the patients at risk if it was included in the email?


  • Patient records
  • Next appointment
  • First and last name
  • Contact information



Question 8)

Which technology creates a security token that allows a user to log in to a desired web application using credentials from a social media website?


  • Open authorization
  • VPN service
  • Password manager
  • In-private browsing mode



Question 9

Which of the following security implementations use biometrics?


Choose two correct answers


  • Fingerprint
  • Phone
  • Credit card
  • Voice recognition
  • Fob


Question 10)

Which of the following firewalls filters traffic based on source and destination IP addresses?


  • Network layer firewall
  • Proxy server
  • Application layer firewall
  • Transport layer firewall
  • Network address translation firewall



Question 11)

Which of the following firewalls filters web content requests such as URLs and domain names?


  • Application layer firewall
  • Proxy server
  • Reverse proxy server
  • Network layer firewall
  • Network address translation firewall



Question 12)

A port scan returns a ‘dropped’ response. What does this mean?


  • A service is listening on the port
  • Connections to the port will be denied
  • There was no reply from the host



Question 13

During a meeting with the Marketing department, a representative from IT discusses features of an upcoming product that will be released next year.

Is this employee’s behavior ethical or unethical?



  • Ethical
  • Unethical



Question 14)

Which of the following is an entry-level certification for newcomers who are preparing to start their career in cybersecurity?


  • CompTIA Security+
  • Microsoft Technology Associate Security Fundamentals
  • ISC2 Certified Information Systems Security Professional
  • ISACA CSX Cybersecurity Fundamentals
  • EC Council Certified Ethical Hacker
  • Palo Alto Networks Certified Cybersecurity Associate



Question 15)

'Cybersecurity certifications are a way for you to verify your skills and knowledge and can also boost your career.'

Is this statement true or false?


  • True
  • False



Note: If you Know Answer 

Question 6) and Question 14) Please comment.. 












Post a Comment

1 Comments

  1. Nice post bro . Thank you for posting something like this

    ReplyDelete