Cybrary Training
Cybrary Training
1
Risk Management
1. Information security baselines for information assets vary depending on which of the Following?
a. Availability and reliability
b. Sensitivity and criticality
c. Integrity and accountability
d. Assurance and nonrepudiation
2. What is the appropriate response when the value of the resource is less than the cost of the
countermeasure?
a. Risk rejection
b. Risk acceptance
c. Risk transference
d. Risk mitigation
8. Who is ULTIMATELY responsible for ensuring that the organizations risks are managed and that
resources are utilized effectively?
a. The IT Staff
b. Users
c. Senior Management
d. Everyone
2
9. Is Risk Management a project?
a. Yes, it is an ongoing and repetitive amount of work that is never complete
b. No, it is not limited by time
c. Yes, it is large in nature and scope and is constrained by time, scope and cost
d. No, it has relative short-term focus on the immediate threats to the organization
12. Which of the following is BEST suited for the review of IT risk analysis results before the results are
sent to management for approval and use in decision making?
a. An internal audit review
b. A peer review
c. A compliance review
d. A risk policy review
13. Prior to releasing an operating system security patch into production, a best practice is to have the
patch:
a. applied simultaneously to all systems.
b. procured from an approved vendor.
c. tested in a pre-production test environment.
d. approved by business stakeholders.
14. Based on the following: •A warehouse is worth $1,000,000, which includes the structure and its
contents. If a fire were to occur, it is expected that 40% of the warehouse would be damaged. The
annual risk of fire 8% A fire prevention countermeasure will cost $5,000 per year. This
countermeasure will reduce the damage to the warehouse from 40% to 15%. How much money is
the countermeasure worth annually?
a. $5,000
b. $27,000
c. $15,000
d. $20,000
e. $150,000
3
16. Which of the following would be the best mitigation strategy to limit the success of spoofed
messages?
a. Implement and require the use of hashing
b. Implement a security awareness program focusing on social engineering
c. Implement the use of digital signatures
d. Implement Message Authentication Codes
18. Risk appetite should be aligned with business objectives to ensure that:
a. resources are directed toward areas of low risk tolerance.
b. major risk is identified and eliminated.
c. IT and business goals are aligned.
d. the risk strategy is adequately communicated.
19. Which group represents the greatest potential for harm to an organization?
a. Hackers
b. Customers
c. Vendors
d. Employees
21. In order to ensure the risk management strategy is in alignment with business objectives, which of
the following is true
a. The IT staff should be solely responsible for development of strategy
b. Senior management should be involved heavily in the strategy development
c. Strategy is developed by the end-users as they are most knowledgeable about the
organization
d. Strategy is developed after policy is written
22. The PRIMARY benefit of using a maturity model to assess the enterprise’s data management
process is that it:
a. can be used for benchmarking
b. helps identify gaps in security controls
c. provides goals and objectives
d. enforces continuous improvement
23. What type of analysis determines the amount to be spent on a countermeasure?
a. Delphi
b. Qualitative
c. Quantitative
d. Risk-based
e. Cost-benefit Analysis
4
24. An accountant has been embezzling money from the organization while responsible for payroll.
Which of the following is the best example of risk ACCEPTANCE (Not what SHOULD you do, but if
you accepted the risk, what would you do?)
a. Fire the employee
b. Work out a payment plan for the employee to pay back the money
c. Do nothing
d. Hire another accountant to do payroll
25. Which one of the following statements describes management controls for implementing a
security policy?
a. They prevent users from accessing any control function.
b. They eliminate the need for most auditing functions.
c. They may be administrative, physical, or technical.
d. They are generally inexpensive to implement.
26. Based on the following: A warehouse is worth $1,000,000, which includes the structure and its
contents. If a fire were to occur, it is expected that 40% of the warehouse would be damaged. The
annual risk of fire 8% What is the Exposure Factor?
a. 40%
b. 8%
c. $1,000,000
d. $400,000
28. It is MOST important that risk appetite be aligned with business objectives to ensure that:
a. resources are directed toward areas of greatest concern to the business.
b. major risk is identified and eliminated
c. So that the IT department can have all the funding it requests
d. 0
29. Which of the following statements BEST describes the VALUE of a risk register?
a. It captures the risk inventory.
b. It is used to record costs associated with risks
c. It is a management tool that helps the risk team develop an appropriate risk response plan.
d. It lists internal risk and external risk.
30. A company is trying to limit the risk associated with the use of unapproved USB devices to copy
documents. Which of the following would be the BEST technology control to use in this scenario?
a. Content filtering
b. IDS
c. Audit logs
d. Group Policy
5
31. Utilizing a cloud service provider for business continuity is:
a. Risk Reduction
b. Mitigation
c. Transference
d. Acceptance
36. Despite a comprehensive security awareness program annually undertaken and assessed for all
staff and contractors, an enterprise has experienced a breach through a spear phishing attack.
What is the MOST effective way to improve security awareness?
a. Review the security awareness program and improve coverage of social engineering threats.
b. Launch a disciplinary process against the people who leaked the information.
c. Perform a periodic social engineering test against all staff and communicate summary
results to the staff.
d. Implement a data loss prevention system that automatically points users to corporate
policies.
37. The preparation of a risk register begins in which risk management task?
a. Risk response planning
b. Risk monitoring and control
c. Risk management planning
d. Risk identification
38. What keeps the organization moving forward in the event that risks are greater than anticipated,
risks are unidentified, or if residual risks are greater than expected?
a. Experience of senior management
b. Ability of IT manager to think quickly and resolve problems effectively
c. Business Continuity and Disaster Recovery Planning
d. Risk Meetings
6
39. Which of the following is MOST important for measuring the effectiveness of a security awareness
program?
a. A quantitative evaluation to ensure user comprehension
b. A reduced number of security violation reports
c. Increased interest in focus groups on security issues
d. An increased number of security violation reports
40. Which business principle is present in risk acceptance, but not risk rejection?
a. Due Diligence
b. Due Care
c. Culpable Negligence
d. Liability
7
Risk Management Framework
1. Which is an example of a technical control?
a. CCTV
b. Access control list
c. Policy
d. IT training
2. Which methods does NIST SP 800-37 propose for assessing security controls?
a. Observe, Objectify, Measure
b. Interview, Examine, Test
c. Examine, Analysis, Report
d. Inspect, Audit, Analyse
3. Which information is evaluated for a system to determine the appropriate security controls?
a. Value to the organization
b. Magnitude of harm occurring from loss of confidentiality, integrity, and availability
c. The probability that this risk might occur
d. All of the above
6. Which term is defined as: Management, operational, and technical safeguards or countermeasures
employed within an organizational information system to protect the confidentiality, integrity, and
availability of the system and its information?
a. Security baselines
b. Guidelines
c. Security controls
d. Best practices
7. Which document provides input into the Select Security Controls step?
a. Minimum Security Baseline (MSB)
b. Results from penetration tests
c. System Security Plan (SSP)
d. Security Assessment Report (SAR)
8. Which is an example of a management control?
a. CCTV
b. Access control list
c. Policy
d. IT training
8
9. Who is responsible for system categorization?
a. Information System Owner
b. Authorizing Official
c. Designated Approving Authority
d. The IT staff
10. What are the risk factors identified in NIST SP 800-30 rev 1?
a. Threats, impacts, vulnerabilities, and likelihood
b. Damage, frequency, asset valuation, and annual loss expectancy
c. Analysis, assessment, valuation, and mitigation
d. Assets, vulnerabilities, valuation, and potential
11. What is level of quantitative risk exceeds the threat of critical functionality to a system?
a. Moderate
b. Medium
c. Low
d. High
14. What should the Information System Owner do to determine the appropriate security control for a
system?
a. Select the initial security control baseline based on the system categorization
b. Tailor and supplement the security controls based on a risk assessment
c. Document the results in the System Security Plan
d. All of the above
15. Which term indicates the overall impact level of an information system with regard to security
objectives?
a. Least common denominator
b. Least privilege
c. High water mark
d. Lowest Security Standard
9
16. What is the significance of FISMA?
a. Assigned NIST the responsibilities for standards and guidelines to categorize information
and information systems and their corresponding security requirements
b. Specified the Secure Systems Engineering processes and describes each step of the Secure
System Development Lifecycle
c. Provided a list of approved algorithms to be used to protect each classification of data from
SBU through Top Secret
d. Provides the process of Certification and accreditation for all federal systems
17. Which NIST Special Publication describes the Risk Management Framework?
a. 800-53a
b. 800-171
c. 800-37 rev1
d. 800-30
18. What are the security objectives specified in FISMA for information and information systems?
a. Confidentiality, Integrity, and Authenticity
b. Confidentiality Integrity and Availability
c. Confidentiality, Integrity and Authorization
d. Confidentiality, Integrity and Non-repudiation
10
24. Which documents should be used to categorize information systems?
a. FIPS 199 and NIST SP 800-60
b. FIPS 140 and FIPS 200
c. NIST SP 800-60 and NIST SP 800-171
d. NIST SP 800-37a and NIST SP 800-70
25. Which RMF step includes the determination of the minimum security baseline?
a. Initiation
b. Planning
c. System Categorization
d. Select Controls
26. Which phase of the RMF includes completing the System Security Plan?
a. Initiation
b. Categorization
c. Selection
d. Implementation
27. Which type of risk analysis provides objective numeric information as an input to a Business
Impact Analysis?
a. Qualitative
b. Quantitative
c. FRAP
d. Estimation
28. What is the term for confidence in security controls implemented within an information system are
effective in their application?
a. Trust
b. Functionality
c. Assurance
d. Assessment
30. Which document provides an overview of security requirements, agreed-upon security controls,
and any supporting security-related documents such as risk assessment?
a. Authorization Decision Document
b. SAR
c. SSP
d. POA&M
11
32. Who prepares the System Security Plan?
a. Authorizing Official
b. Information System Owner
c. Information Security Officer
d. Customer
33. Which term defines the least possible security controls for a system?
a. Hardened system
b. Minimum security baseline
c. System security guidelines
d. Access control guidelines
34. Which document is defined by DoD 8510.01 as being used: To assist agencies in identifying,
assessing, prioritizing, and monitoring security weaknesses found in programs and systems, along
with the process of corrective efforts for those vulnerabilities?
a. Security Assessment Report (SAR)
b. System Security Plan (SSP)
c. Plan of Action and Milestones (POA&M)
d. Security Controls Assessment (SCA)
12
Policy Development
1. Which is the best definition of a gap analysis?
a. Variance analysis in relation to desired performance
b. A management tool to examine risk responses vs. expected results
c. A means of examining current state vs. desired state and how to achieve desired state
d. A function of the audit team to determine if best practice are being followed
5. What is the name for step-by-step instructions for how to carry out a task?
a. Policy
b. Procedure
c. Standard
d. Guideline
8. Which legislation is an important element for an employee who processes medical information?
a. Graham Leach Bliley Act
b. Sarbanes Oxley
c. Basel II
d. HIPAA
13
9. Why should senior management be involved in the creation of a security strategy?
a. To ensure alignment with organizational objectives
b. To inspire confidence in their customers
c. To demonstrate due diligence
d. To avoid legal non-compliance
10. What does an AH (Authentication Header) use to provide non-repudiation of a source address?
a. integrity check value
b. Security lock
c. Encryption
d. IKE
11. Which regulation requires corporate accountability in order to prevent internal fraud?
a. Graham Leach Bliley Act
b. Sarbanes Oxley
c. Basel II
d. HIPAA
12. Management requires that each employee maintain a workspace devoid of sensitive information,
except when directly working with such information. Which document type would mandate this?
a. Policies
b. Procedures
c. Standards
d. Guidelines
13. What is the most significant driver for the development of policy?
a. Laws and regulations
b. Budget
c. Timeline
d. Company Culture
14. A banks totals have been off by several hundred dollars each of the last six weeks. Which policy
might the bank manager implement to determine if one particular person is responsible for the loss?
a. Acceptable use policy
b. Data retention policy
c. Mandatory vacations policy
d. Privacy policy
16. While policy states that all data should be encrypted, which document is likely to specify the type
of encryption to use?
a. Policy
b. Procedure
c. Standard
d. Guideline
14
17. If the organization has a group of Linux systems, a group of Microsoft systems, and a group of
Apple systems being used by employees, how many baseline images should the organization have?
a. 1
b. 2
c. 3
d. 4
19. An organization provides its sales team with cellular phones. Employees have been advised that
the phones are theirs to keep. They can trade them in, sell them, and keep them after termination.
However, they are also instructed that they are accountable for being contacted 24 hours a day.
Which policy would define these requirements?
a. Data ownership
b. Resource ownership
c. Separation of duties
d. Employee termination
21. Which document describes senior managements commitment to security, financial support, and
other resources?
a. Policy
b. Procedure
c. Standard
d. Guideline
15
25. An employee has been subjected to a social engineering test and was persuaded to give their
password to a stranger. How should this situation be handled in a low-medium security
environment?
a. Termination of the employee
b. Re-training of the employee
c. Termination of the person conducting the social engineering test as they should never
attempted to get an employees password
d. No action should be taken
28. What are the repercussions if policy is not applied correctly and universally?
a. Employee lawsuits
b. Invasion of employee privacy
c. Disgruntled employees
d. All of the above
29. For an employer to infringe upon an employees privacy, what should the employer do?
a. Be stealthy as to avoid detection by the employee
b. Make sure they document what they find
c. Try to evaluate as much information as possible, so as to draw a better conclusion
d. Notify the employee
30. Password parameters of at least 8 characters include alpha-numeric and special characters . Is an
example of what kind of control mechanism?
a. Standard
b. Policy
c. Procedure
d. Guideline
31. You have been hired as an Information Security Officer and have been asked to review existing
policy to determine how to become compliant with new regulations. What should you do?
a. Gap analysis
b. Contact your legislator to determine changes in the regulations
c. Rewrite policy from scratch to ensure compliance
d. Delegate the task, as it is not your responsibility as an ISO
16
33. Is it ok for an employee to browse social media while on the clock (not at break or at lunch)?
a. Yes, as long as the employee gets their work done
b. No, it is unethical to use company time for browsing
c. Policy should specify whether or not this is ok
d. It is up to the employees discretion
35. If senior management writes policy, who is best suited to write procedures?
a. Senior management
b. Functional management
c. IT department
d. End users
38. Which type of policy would dictate how employees can use company resources?
a. Computer use policy
b. Data use policy
c. Acceptable use policy
d. Separation of duties policy
40. Which policy is designed so that no single employee can perform a sensitive activity on their own?
a. Job rotation
b. Privilege escalation
c. Mandatory vacations
d. Dual Control
17
IT Security Governance
1. What is the annual amount of threats compromising vulnerabilities?
a. ARO
b. ALE
c. SLE
d. MTTR
2. If I was to check my social media , using a company computer. That may be in violation of ?
a. Mandatory Vacation
b. Security Policy
c. Acceptable Use Policy
d. Privacy Policy
4. When presenting our evidence in the court of law, who is best to have as an expert witness?
a. CEO
b. IT Staff
c. Forensic Expert
d. Security Guard
7. When using social media and applications we have to make sure there is no breach of ?
a. Confidentiality
b. Integrity
c. Availability
d. All of the Above
8. What is the measure of the down time that we expect a system device to be down?
a. MTTR
b. MTBF
c. ALE
d. SLE
18
9. Backing out of setting up HQ in an area that is prone to natural disasters would be an example of ?
a. Risk Assessment
b. Risk Avoidance
c. Risk Transfer
d. Risk Mitigation
10. What happens when you accept the responsibility of the risk. After not wanting to put any
additional money into the risk to deter it?
a. Risk Avoidance
b. Risk Mitigation
c. Risk Acceptance
d. Risk Transfer
11. An agreement between 2 entities in regards to the level of service being delivered?
a. Interoperability agreement
b. Service Level Agreement
c. Social Media Agreement
d. Business Partner Agreement
12. If not performed correctly, what would allow smaller incidents to build over time and become
catastrophic?
a. Change Management
b. User Right and Permission Review
c. Incident Management
d. Technical controls
14. What is a decommissioned virtual computer that is still on the network, but no longer receiving
updates?
a. Virtual OM
b. Old Computer
c. Orphan VM
d. None of the Above
16. What is good policy in place to help deter from fraudulent activities taking place?
a. Acceptable Use Policy
b. Mandatory Vacation
c. Security Policy
d. Privacy Policy
19
17. What type of control uses passwords and encryption?
a. Technical
b. Management
c. Operational
d. All of the Above
18. What ensures that all changes carried out in the enterprise are properly reviewed?
a. Incident Management
b. Change Management
c. User Right and Permission Review
d. Memorandum of Agreement
19. What are controls that avoid the incident from occurring?
a. Deterrent Controls
b. Preventive Controls
c. Detective Controls
d. Compensating Controls
20. What allows for multiple people to learn multiple duties so that a vacuum is not created by the
loss of a person?
a. Acceptable Use Policy
b. Privacy Policy
c. Security Policy
d. Job Rotation
22. When you have the evidence, what should you do?
a. Nothing, work with the evidence you have
b. Capture a system image
c. Transfer everything to a hard drive
d. Make multiple DVD-ROM copies of all files, folders. Etc
20
25. What happens when our security system does not report a problem when there is actually a
problem happening?
a. double positive
b. false negative
c. false positive
d. double negative
26. When collected evidence you need to capture in order of volatility. Out of the following, which
should be collected first?
a. Registers, Cache,RAM
b. Network Caches, Virtual Memory
c. Hard drives, Flash Drives
d. CD-Rom , DVD-Rom
28. What is defined as employees being allowed the exact amount of permissions to get the work
done. ?
a. Principle of Least Privilege
b. Principle of Most Privilege
c. Principle of All Privilege
d. None of the Above
29. What is the point at which you want to recover your data from?
a. RTO
b. RPO
c. ALE
d. SLE
21
33. What type of agreement describes how business will be conducted between the partners?
a. Interoperability agreement
b. Service Level Agreement
c. Business Partner Agreement
d. Memorandum of Agreement
34. What is a hardware or software solution that implements and enforces a policy?
a. Control
b. standard
c. Enforcer
d. None of the Above
35. What is the measure of how long the device will be used until it fails?
a. MTTR
b. MTBF
c. ARO
d. ALE
36. What happens when our security system reports a problem when there is actually no problem at
all?
a. false negative
b. double negative
c. false positive
d. double positive
37. _______________ dictates the critical job functions be broken down into multiple roles
a. Mandatory Vacation
b. Least Privilege
c. Separation of Duties
d. Security Policy
38. What is the measure of time that we can recover if a device is down?
a. RTO
b. RPO
c. MTBF
d. MTTR
39. What is a policy that dictates how privacy should be carried out within the organization?
a. Mandatory Vacation
b. Acceptable Use Policy
c. Privacy Policy
d. Separation of Duties
22
IT Governance and Management
1. What refers to data and knowledge that is not commonly known?
a. Copyright
b. Trademark
c. Intellectual Property
d. a new idea
3. When would a new requirement possibly become introduced within the business process?
a. Regulations
b. Business need
c. Customer
d. All of the Above
4. Program Management sustains programs needed for the business to survive such as?
a. Marketing
b. Bookkeeping
c. Facility Maintenance
d. All of the Above
6. What type of continuity planning would plan out who would be running the company?
a. executive continuity
b. client continuity
c. Investor continuity
d. product line continuity
23
9. The Project Management Institute create which of the following benchmarks?
a. NIST Controls Matrix
b. FISMA
c. OPM3
d. BCMM
10. When the Board of Directors, come up with the new long term vision, how many years are they
strategically planning for?
a. 6 months
b. 1 year
c. 3 or more years
d. 2 months
11. (Where will the data applications and technology reside?) is a question that the _________ plan
focuses on.
a. Data Plan
b. Facilities Plan
c. Organizational Plan
d. Technology Plan
12. True or False? USA has stronger Privacy laws than the European Laws
a. TRUE
b. FALSE
c. 0
d. 0
13. What quality control model targets CMM levels 3-5 and is the international derivative of TQM?
a. PMI
b. ISO9001
c. Prince2
d. SigmaSix
14. The ________ function is to convert interested prospects from marketing campaigns into closed
deals.
a. Marketing
b. Manufacturing/Software Development
c. Sales
d. Finance
15. According to the BSC, What perspectives emphasis would ask: What information do I need to beat
my competitor?
a. Customer
b. Business Process
c. Financial
d. Growth and Learning
24
17. Obtaining control over IT expenses would belong to what IT subset of the BSC?
a. Mission
b. Strategy
c. Metrics
d. None of the above
21. How should you determine the members of the IT steering committee?
a. Appointed by CEO
b. Designated in the IT Steering Committees Formal Charter
c. Appointed by Board of Directorss
d. Elected by employees
25. Who would not represent the IT department on the steering committee?
a. CIO
b. VP of Information Technology
c. CFO
d. All of the Above
25
26. What type of policy explains the condition to be prevented and provides notice as to the
consequences of failure?
a. Advisory
b. Regulatory
c. Informational
d. None of the above
30. What step of the BPR plan would you take an Analysis of Alternatives?
a. Reconstruct
b. Redesigning
c. initiate
d. Diagnose
26
34. What type of IT funding would include Individual Departments having a direct charge for system
use?
a. Shared Cost
b. Charged-Back
c. Sponsor Pays
d. None of the above
35. What is the process of rolling out new products, maintaining profits, shutting down losses and
aiding in continuing the company after a total disaster takes place?
a. Business Continuity
b. Business Perseverance
c. Business Lockdown
d. Disaster Relief Plan
38. True or False? With BPR.If you are thinking big, A top-down approach is best
a. TRUE
b. FALSE
c. 0
d. 0
39. What would disallow you from going to work with your company competitor, immediately after
departure from your current company?
a. Confidentiality Agreement
b. Non-Competition Agreement
c. Performance Evaluation
d. All of the Above
40. What project management model has 9 process areas and focus on organizational process
methodology?
a. PMI
b. ISO9001
c. Prince2
d. TQM
27
Organizational Data Security Fundamentals
1. What are the 3 C's?
a. Cost, Classify, Control
b. Change, Classify, Control
c. Cost, Change, Classify
d. Cost Change Control
7. What is PII?
a. Personal Integrity Identifier, A way of checking one's integrity
b. Personally Identifiable Information, any data that could identify an individual
c. Personality Identity Intelligence, a new way of testing if one has the right personality to fill a
position
d. None of the Above
28
9. Who has the authorization to modify files?
a. Administrators
b. Guests
c. Regular users
d. Nobody
11. Which of the following most closely matches the definition of social engineering?
a. Attacking Computer systems by manipulating people
b. Attacking Computer systems by guessing passwords
c. Attacking Computer systems with advanced technical attacks
d. Attacking Computer systems through physical insecurities
17. Who is responsible for all security-related tasks, focusing on Confidentiality and Integrity?
a. Network Administrator
b. Steering Committee
c. Security Administrator
d. CEO
29
18. What is not a technique of System Hardening?
a. Locking the Server Room Door
b. Installing all the latest new, intrusive programs and apps
c. Renaming Default Accounts
d. Changing Default Settings
30
27. Who is not a member of Senior/Executive Management?
a. CEO
b. Security Administrator
c. CIO
d. CFO
28. What is a responsibility of the ISO? (Select One)
a. Ensure compliance with government and industry regulation
b. Establish security measurements
c. Communication of Risks to Senior Management
d. All of the Above
35. What could we use to make sure data stays encrypted in transit?
a. TLS
b. SSL
c. IPsec
d. All of the Above
31
Access Control and Identity Management
1. An administrator has noticed an increase in failed access attempts to the network. He needs to
implement a quick solution before a longer term solution can be evaluated. What would be a logical
step towards mitigation?
a. Install an Intrusion Prevention System
b. Increase the password complexity requirements
c. Lower the clipping level on the number of logins
d. Install a firewall
3. Which of the following security groups should not be given privileged access?
a. Network Administrators
b. Security Administrators
c. System Administrators
d. Internal Auditors
6. If the NTFS settings of a folder are Full Control (in a Windows environment) what impact does
changing the shared folder permission to Read Only have on a user’s ability to locally access to the
file?
a. None
b. The user would only be able to view the file, and would not be allowed to modify in any
way
c. The user would only be able to view the file name and its properties, but not to make any
changes
d. The user would be denied access since there is a conflict in permissions
7. Separation of Duties is an essential control in order to mitigate risks associated with social
engineering. However, to truly be beneficial it should be coupled to
a. Need to know
b. Auditing
c. Incidence Response
d. Job Rotation
32
8. Which of the following security groups should not be given privileged access?
a. Public access accounts
b. Nonpublic accounts
c. Privileged accounts
d. Non-privileged accounts
15. Which type of attack involves the use of pre-computed password hashes?
a. Dictionary
b. Brute Force
c. Hybrid
d. Rainbow Tables
33
17. Why is it important to have a policy to enforce a minimum length of time for a between password
changes?
a. Users will change passwords so frequently that they forget them
b. Users will change passwords frequently to override password history and allow themselves
to continue using the same passwords
c. Password replication to domain controllers happens only every thirty minutes so the user
may get locked out of services
d. Changing passwords frequently increases administrative overhead
18. In order to implement the strongest means of authentication, which type should be used?
a. Biometrics
b. Type I
c. Type II
d. Multi-Factor
19. Three sales users need access to a printer. Senior management advises you to grant access to the
marketing printer. Which is the best way to accomplish this task?
a. Since there are less than five users, grant permission directly to the users
b. Add the sales users to the marketing group
c. Create a new group called Sales and add the users to the group. Grant permission to the
group
d. Create an organizational unit called Sales. Add the users to the group. Grant permissions to
the organizational unit
20. Which language is used for the exchange of an authentication token across federated trusts?
a. SPML
b. SAML
c. XML
d. HTML
34
24. On a mail server, which would be the best means of limiting messages from specific spammers?
a. Black-listing
b. White-listing
c. Content filtering
d. Spam filtering
25. In order to validate a claimed identity, which best describes an authentication token?
a. One-time password generator
b. Time-based access control
c. Credentials
d. Synchronous access control
26. What action should a user take if someone tries to piggyback on their card swipe?
a. Tell the individual that they aren’t authorized to be in the building
b. Ask the individual to show them an access card. If they are unable to do so, do not allow
the individual to enter the building
c. Ask the individual to show them an access card. If they are unable to do so, escort the
individual to security
d. Notify security at once
27. In order to access a Kerberized domain, what is necessary for a user to access an object?
a. A ticket
b. A TGT
c. An asymmetric key
d. A public key
28. A user in a Windows environment is in multiple groups with the following conflicting permissions:
SALES GROUP [Shared Folder, Permission—Change, NTFS permission Modify] USERS [Shared
Folder Permission—Read Only NTFS Permission Read] TECHNICIANS [Shared Folder Permission—
Full NTFS Permission RWX] What is the result?
a. The user would have Full permission to the folder
b. The user would have Read permission to the folder
c. The user would have RWX permission to the folder
d. The user would have Modify permission to the folder
30. When assigning permissions to folders, what is the difference between an implicit deny and an
explicit deny?
a. Because they both result in no access, they are essentially the same
b. An implicit deny can be overridden by a network administrator, however an explicit deny
cannot
c. An implicit deny is the default permission in Windows shares, whereas an explicit deny must
be manually configured
d. An explicit deny trumps all other permissions. An implicit deny can be overridden by other
permissions.
35
31. What is true of passphrases?
a. Should consist of a known phrase that the user will be able to remember easily, while still
being sufficiently long
b. Take exponentially more time to crack, even if the phrase is common
c. Can be cracked as easily as a password if the phrase is common
d. Are only used in proprietary software like PGP
32. At what point in time does the user’s password cross the network in a Kerberized environment?
a. Upon initial access
b. During the negotiation handshake
c. Before being granted a TGT
d. Never
34. When reviewing an audit log, which of the following is of greatest concern?
a. Successful login attempts
b. Account Expired
c. Password Expired
d. Account lockout
35. In the event of a security incident regarding a computer, what should users be trained to do?
a. Turn off the affected system
b. Remove the affected system from the network
c. Call the incident response team
d. Inspect the system to determine the depth of the attack
37. In a Windows environment, which of the following best describes the relationship between
Security Groups and Organizational Units?
a. Organizational Units are designed to grant permission to resources in the domain. Security
Groups of are used for the assignment of group policy
b. Organizational Units are designed for the assignment of group policy. Security Groups of
are used to grant permissions to resources in the domain
c. Security Groups are a way of organizing users. Organizational Units are a means of
grouping non-computer resources
d. Security Groups are a means of grouping non-computer resources Organizational Units are
a way of organizing users.
36
38. You are running to the building, asking the security to open the gate for you as you have a
meeting with the CEO and you are late. The security lets you in without checking your identity.
What does this situation represent?
a. Phishing
b. Reverse social engineering
c. Tailgating
d. Impersonation
39. Analyse the following scenario: Attacker: Hi Frederica. I am Megan from Lotto.com and I am so
happy to inform you that you have won a weekend with your fiancée in Budapest. What tactic is
the attacker using?
a. Greed
b. Sympathy
c. Authority
d. Supplication
40. Why would we want to prevent users from changing the system date and time on their systems?
a. It would cause an inability to audit the user’s actions
b. It may throw off password replication
c. Group policy replication will not happen as scheduled
d. Kerberos is time-sensitive and the user may be locked out
37
Asset Security
1. What would you document during Configuration Management Documentation?
a. Permanent IP if applicable
b. Model
c. Organizational department label
d. All of the above
3. Who is responsible for Risk Analysis and Mitigation in relation to information assets?
a. CIO
b. Data Custodian
c. Network Administrator
d. ISO
38
9. What is an indicator that makes up the value of an asset?
a. Value to the organization
b. Loss if compromised
c. Legislative drivers
d. All of the above
17. Who is responsible for all security-related tasks, focusing on Confidentiality and Integrity
a. Network Administrator
b. Steering Committee
c. Security Administrator
d. CEO
39
18. What is a way of protecting files in process?
a. Use Good Policies/Best Practices
b. Log out of your computer when you leave your desk
c. Watch for shoulder surfing
d. All of the above
40
Protection of Information Assets
1. How often should biometric templates be updated?
a. Weekly
b. Monthly
c. Annually
d. Quarterly
2. Which attack uses an automated modem dialing utility to launch a brute force attack against a list
of phone numbers?
a. War dialing
b. Speed dialing
c. Spear phishing
d. Drunk dialing
4. Which individual is focused on a desire to break in, take over, damage, or discredit legitimate
computer processing?
a. Hacker
b. Arsonist
c. Third-party criminal
d. White collar criminal
5. What is the term describing an equal balance of speed and accuracy for biometrics?
a. Crossover Error Rate
b. Equal Error Rate
c. False Acceptance Rate
d. False Rejection Rate
7. Which individual uses existing tools and programs to harm an organization’s infrastructure?
a. Cracker
b. Rogue ethical hacker
c. Script kiddie
d. All of the above
8. Which technique is used to deduct a small amount of money from every customer?
a. Pastrami attack
b. Pepperoni attack
c. Salami attack
d. Bologna attack
41
9. Which term describes when a biometric system does not create a user profile?
a. False Acceptance Rate (FAR)
b. False Rejection Rate (FRR)
c. Failure to Enroll
d. Crossover Error Rate (CER)
13. Which term describes when an legitimate user fails to authenticate with biometrics?
a. Failure to Enroll
b. False Acceptance Rate
c. False Rejection Rate
d. Crossover Error Rate
14. Which hacking technique allows a website to direct activity on another website?
a. XSS (cross site scripting)
b. XML
c. SQL Injection
d. None of the above
16. What is the term for spying by individuals or governments with the intent to gather, transmit, or
release information which benefits a foreign organization?
a. Sabotage
b. Fraud
c. Blackmail
d. Industrial espionage
42
17. Which attack involves retransmitting packets within a short time window in order to impersonate a
legitimate user?
a. Packet replay
b. Origin attack
c. Plug and play
d. Source routing
18. Which term describes hidden access to software used during testing?
a. Logic bomb
b. Time bomb
c. Trap door
d. Rootkit
19. Which type of password attack attempts to use all possible passwords?
a. Brute force
b. Dictionary
c. Hybrid
d. None of the above
21. Which attack involves discovering open wireless networks from a vehicle?
a. Plug and play
b. War dialing
c. War driving
d. Salami technique
23. Can a firewalls control traffic that does not directly pass through the device?
a. Yes
b. No
c. 0
d. 0
24. Which attack uses several computers to prevent legitimate use of a network resource?
a. DoS
b. DDoS
c. Spear phishing
d. Worm
43
25. Which of these firewalls is a third generation device?
a. Packet filter
b. Stateful inspection
c. Application proxy
d. None of the above
26. Which type of malware lies dormant until an event triggers execution?
a. Logic bomb
b. Time bomb
c. Trap door
d. Rootkit
27. Which type of server is placed in in a DMZ to interest and attract attackers?
a. Honeypot
b. Honeydew
c. Honeynest
d. Honeycomb
28. Which group should be considered for the effects of using biometric authentication?
a. Employees
b. Customers
c. Business partners
d. All of the above
29. Which method ignores the configuration of network routers in order to follow instructions
designated by the sender?
a. Packet replay
b. Source routing
c. Social engineering
d. War driving
30. What is the term for willful and malicious destruction of an employer’s property?
a. Sabotage
b. Blackmail
c. Fraud
d. Industrial Espionage
31. Which attack involves rummaging through the trash for discarded information?
a. Spear phishing
b. Dumpster diving
c. Phishing
d. Social engineering
44
33. Which term is the second type of authentication?
a. Something you know
b. Something you have
c. Something you are
d. All of the above
34. Which type of access control allows an individual to designate the authorization level for other
individuals?
a. Mandatory Access Control (MAC)
b. Discretionary Access Control (DAC)
c. Role Based Access Control (RBAC)
d. Task Based Access Control (TBAC)
38. Which type of biometric authentication measures the unique features in the color ring surrounding
the pupil of an eye?
a. Iris scan
b. Face scan
c. Retinal scanning
d. Pupil scan
39. Which technology converts each biometric image into a unique data template?
a. Biometric template generator
b. Biometric template matcher
c. Biometric photoshop
d. Biometric image generation suite
45
Incident Management
1. The CISO
a. Must prevent all disruptions to business
b. Must make sure we are profitable
c. Must make sure we are prepared for routine work
d. Must make sure we are prepared for an incident
5. Often attackers
a. Find new targets
b. Go back to the same target
c. Give up trying
d. Apologize
6. Those that handle the incidence response reports
a. Should know how to evaluate whether or not a report is actually an incident or not
b. Must know how to evaluate whether or not a report is actually an incident or not
c. Can not know how to evaluate whether or not a report is actually an incident or not
d. Must know how to evaluate whether or not a report is actually a disaster or not
7. When you have multiple events that have a negative impact on the environment
a. That becomes a disaster
b. It is neither good, nor bad
c. It may or may not be an incident
d. That becomes an incident
46
9. Incident response is different from forensics;
a. With forensics our primary focus is on evidence collection
b. With forensics our secondary focus is on evidence collection
c. With forensics our primary focus is on evidence destruction
d. With forensics our primary focus is on resource collection
11. In an incident
a. There is an inherent assumption of a malicious nature or the presence of malicious intent
b. There is no inherent assumption of a malicious nature or the presence of malicious intent
c. There is the presence of malicious intent
d. There is no inherent assumption of a positive nature or the presence of good intent
13. Triage is
a. The process of prioritization of tasks
b. The process of sorting, categorizing, correlating, prioritizing, and assigning incoming
reports/events
c. The process of isolating infected computers
d. A and B
47
17. Those that handle the incidence response reports
a. Must take them with a grain of salt
b. Must write them seriously
c. Must take them
d. Must take them seriously
48
25. It is up to you as a CISO
a. To put the proper policies, procedures, and guidelines in place so that we can respond to
those events as quickly as possible
b. To put the proper policies and guidelines in place so that we can respond to those events
as quickly as possible
c. To delegate someone to put proper policies, procedures, and guidelines in place so that we
can respond to those events
d. To put the proper guidelines in place so that we can respond to those events as quickly as
possible
49
32. We will document how we are going to conduct
a. Our review after an incident
b. Our review before an incident
c. Our review during an incident
d. B and C
33. In certain attacks like rootkits, which embed with the operating system kernel
a. We want to restore from backup because that rootkit may already be in the backup as well
b. We dont want to restore from backup because that rootkit may already be in the backup as
well
c. We dont want to restore from original media because that rootkit may already be in the
original media as well
d. B and C
50
39. Criticality deals with
a. How time sensitive a service or process is
b. How resource sensitive a service or process is
c. How management sensitive a service or process is
d. How staff sensitive a service or process is
51
Business Continuity and Disaster Recovery
Planning
1. An appropriate solution for a Web store-front service with a low MTD might be
a. Frequent backup
b. Clustering
c. Load Balancing
d. RAID
3. A Call Center currently handles over two thousand calls per day. The average hold time is under two
minutes and 96% of incoming calls are processed. In the event of a disaster, incoming calls will be
transferred to another call center on the West coast. The West coast center will still be processing its
normal amount of incoming calls, in addition to those transferred. Management understands normal
objectives will not be met. Management wants to ensure hold time is less than 5 minutes and 85% of
incoming calls will be processed. What are these metrics called?
a. MTD
b. RTO
c. RPO
d. SLA
5. The local newspaper cannot afford a backup facility stocked with machinery and equipment to use
in the event of a disaster. In this instance it might be better to
a. Invest the money anyway, as it is essential that the paper be able to continue operations
b. Enter a reciprocal agreement with another newspaper
c. Invest in a Rolling hot site
d. User a mirrored site instead
52
8. Sara is charged with creating the disaster recovery plans for her group. She is very concerned about
paper-based tests not being realistic enough. She is also concerned with risking downtime of
production systems. Which test type is most appropriate in this situation?
a. Structured walkthrough
b. Warm
c. Simulation
d. Parallel
12. Which type of test involves business department leaders discussing whether the plan meets the
needs of each department, and satisfies requirements for interoperability?
a. Full-Interruption Test
b. Checklist
c. Paper-based
d. Structured Walk-through
14. Who is ultimately responsible for ensuring the Enterprise’s BCP is effective and up to date?
a. BCP Coordinator
b. Senior Management
c. The BCP Committee
d. The Project Manager
53
16. In developing a Business Impact analysis for an organization, it is determined that their email
server is a critical resource. If the server is unavailable more than two hours, the business will lose
more income than is acceptable. What is the term for this time period?
a. MTD
b. RPO
c. WRT
d. SLA
17. After a disaster, a business leader tells you that it took much too long to restore operations to a
critical server. Which metric will indicate the length of time in which this particular server must be
restored?
a. MTD
b. MTTF
c. MTBF
d. RPO
19. Which document includes metrics such as MTD, RPO, and RTO?
a. Risk Management Strategy
b. Business Continuity Policy
c. Business Impact Analysis
d. Recovery Time Objectives
20. A legally binding document describing a cooperative relationship between two parties wishing to
work together to meet an agreed upon objective is called a
a. MOU
b. MOA
c. SLA
d. ISA
54
24. Sara is charged with creating the disaster recovery plans for her group. She is very concerned
about paper-based tests not being realistic enough. She is also concerned with risking downtime of
production systems. Which test type is most appropriate in this situation?
a. Structured walkthrough
b. Warm
c. Simulation
d. Parallel
25. An organization performs a nightly backup as its primary means of providing redundancy of data.
It requires that backups be tested weekly and mandates that the files servers which store the data be
down no longer than two hours. What is the company’s MTD for the file servers?
a. None
b. One day
c. Two hours
d. One week
26. Before implementing the Disaster Recovery Plan, it must be thoroughly tested. Which of the
following tests is the most realistic indication of whether the plan will be successful?
a. Simulation
b. Structured walk-through
c. Parallel
d. Full Interruption
27. Recovery point objectives (RPOs) can be used to determine which of the following?
a. Maximum tolerable downtime
b. Frequency of backups
c. Baseline for operational resiliency
d. Time to restore backups
29. The senior network administrator responsible for managing perimeter security devices is named in
the disaster recovery plan as the primary person to perform firewall recovery at an alternate site.
However, this administrator may move to another department and may no longer be available for
this role. Which plan should be used to prepare for such situations?
a. Business impact analysis
b. Succession
c. Personnel migration
d. Restructuring
55
31. After a disaster, a business leader tells you that it took much too long to restore operations to a
critical server. Which document should you review in order to examine the agreed upon metrics for
this particular server?
a. Recovery procedures
b. Reconstitution procedures
c. Business Impact Analysis
d. Memorandum of Agreement
32. What is the most important consideration when developing a disaster recovery plan?
a. Business processes
b. IT Process
c. Human life
d. Business Assets
33. The local newspaper cannot afford a backup facility stocked with machinery and equipment to use
in the event of a disaster. In this instance it might be better to
a. Invest the money anyway, as it is essential that the paper be able to continue operations
b. Enter a reciprocal agreement with another newspaper
c. Invest in a Rolling hot site
d. User a mirrored site instead
35. Which metric addresses how current restored data should be?
a. RTO
b. RPO
c. WRT
d. MTD
36. You have been asked to estimate the value of servers purchased a little over two years ago, as part
of information you are collecting for the business continuity plan. What should this value be based
on?
a. Original Cost
b. Original Cost plus depreciation
c. Net present value
d. Replacement cost
37. The sub-plans of the Business Continuity Plan fall in one of the three categories. Which of the
following is NOT one of the categorizations for the plans
a. Sustain
b. Report
c. Protect
d. Restore
56
38. Within an organization, who can declare an emergency?
a. Senior Management
b. Anyone
c. BCP Coordinator
d. Designated Official
39. What document identifies an enterprise’s business processes and functions and categorizes them
based on criticality?
a. BCP Policy
b. Disaster Recovery statement
c. Business Impact Analysis
d. Reconstitution Strategy
40. The Business Continuity Plan includes a number of sub-plans. Which plan would provide
instructions on how to evacuate the facility safely in the immediacy of the disaster
a. COOP
b. Business Resumption Plan
c. Occupant Emergency Plan
d. Crisis Notification Plan
57
Open Systems Interconnection Model
1. Firewalls provide a wide range of functionality. Which is not a benefit of layer 3 firewalls vs. layer 7
firewalls?
a. Speed
b. Lower cost
c. Deeper packet inspection
d. Performance
2. In relation to firewalls and content inspection services, which layer of the OSI model allows for the
greatest granularity in filtering?
a. Application
b. Session
c. Network
d. Data link
58
9. Which organization developed the OSI Model?
a. ISO
b. IANA
c. IETF
d. TCSEC
15. A ping flood exploits the ICMP protocol. Which OSI layer is affected by this attack?
a. Physical
b. Transport
c. Network
d. Application
16. Which OSI layer supports the setup, maintenance, and teardown of a connection from a client to a
server?
a. Network
b. Transport
c. Data link
d. Session
59
18. Which OSI layer supports the detection of Ethernet collisions?
a. Physical
b. Data link
c. Network
d. Transport
19. Packet filter firewalls operate at layer 3 of the OSI model. Which information is used to determine
if traffic is allowed?
a. Initiation of session
b. Content
c. Active Directory groups
d. IP address
60
27. Which layer is responsible for multimedia formats?
a. Presentation
b. Application
c. Session
d. Transport
28. Which OSI layer supports the operation of IP, ICMP, IGRP, IGMP, IPsec, IKE, and ISAKMP?
a. Network
b. Transport
c. Data link
d. Application
30. How many layers does the OSI Reference Model contain?
a. 7
b. 6
c. 5
d. 4
31. Many times people mistakenly refer to twisted pair cabling as “Ethernet Cable”. However, Ethernet
technology and cables function at different layers of the OSI. At which layer does cable function?
a. 1
b. 2
c. 3
d. 4
32. Which layer of the OSI model does not support any protocols?
a. Session
b. Application
c. Transport
d. Presentation
33. A SYN flood exploits the TCP handshake. Which OSI layer is targeted in this attack?
a. Network
b. Transport
c. Data link
d. Application
61
35. At layer 7, data is being prepared to be transmitted. Header information is added at each layer
traveling downward towards layer 1. On the receiving end, headers are stripped away as the data
flows upward towards the user. What is the process called when headers are stripped away?
a. Encapsulation
b. Decapsulation
c. Encryption
d. Decryption
37. Which layer does not provide sophisticated functions, and only provides a physical path for signals
to travel?
a. 7
b. 5
c. 3
d. 1
38. The OSI model is a peer-to-peer model. What does this mean?
a. Headers added at a layer on the sending computer are needed by the same layer on the
receiving computer
b. Headers added at a layer on the receiving computer are needed by the same layer on the
sending computer
c. The OSI model was designed for peer-to-peer networks
d. Each layer acts as a peer to its upper and lower models
39. Which two sublayers are part of the data link layer?
a. MAC and CDP
b. IP and LLC
c. MAC and LLC
d. RTP and PPP
40. Which functionality does a layer 3 switch have compared to a layer 2 switch?
a. Uses IP addresses
b. Uses MAC addresses
c. Uses session-based information
d. Analyses content
62
TCP/IP
1. What is the default subnet mask for a Class A network?
a. 255.0.0.0
b. 255.255.0.0
c. 255.255.255.0
d. 255.240.0.0
2. Your organization supports a legacy application that uses NetBIOS. Which type of server is needed
to interface with this application?
a. RAS
b. DNS
c. WSUS
d. WINS
3. What command(s) would be used to send a continuous stream of packets to a target IP address?
a. ping -t
b. ping -l
c. ping localhost
d. netstat -ano
63
8. Use the following output from netstat to answer the following question: What services are currently
listening on this workstation?
a. RDP
b. HTTP
c. HTTPS
d. NTP
9. You have been tasked with finding a subnet mask large enough to accommodate an address space
of 1000 addresses as efficiently as possible. What subnet mask do you use?
a. 255.255.255.0
b. 255.0.0.0
c. 255.255.252.0
d. 255.255.0.0
10. What process ID is associated with remote desktop protocol on this workstation?
a. 980
b. 4
c. 1764
d. 3389
64
11. Which protocol is used by ping and tracert?
a. ICMP
b. IGMP
c. IMAP
d. HTTP
15. Your workstation is having a TCP conversation with another node across TCP port 80. Your
machine receives a TCP segment with the header checksum 0x5149. Your machine calculates the
checksum for that segment as 0x6372. What will your workstation do to the TCP segment?
a. Nothing.
b. The workstation will reset the TCP connection.
c. The segment will be discarded.
d. Your machine will drop the connection to the opposite server and not reestablish
communication with it.
65
19. Your organization supports a legacy application that uses NetBIOS. Which type of server is needed
to interface with this application?
a. RAS
b. DNS
c. WSUS
d. WINS
20. A customer has called in complaining about not being able to connect to network resources on
their workstation. You ask for their workstation’s hostname and try to ping it. Your pings are
unsuccessful. You instruct the customer on how to find their IP address and they report it as
169.254.36.237. What issue is affecting the customer at this time?
a. They are not connected to the network.
b. They are connected to the network, but their workstation hasn’t picked up an IP address
from the network’s DHCP server.
c. Their firewall is misconfigured to block DNS messages.
d. The NIC driver needs to be updated.
21. When a packet leaves a workstation for a destination on another network, which MAC address is
needed to get the packet to its destination?
a. The MAC address of the sending workstation
b. The MAC address of the destination node
c. The MAC address of the source workstation’s default gateway
d. The MAC address of the destination router
22. In order to communicate with other nodes, workstations need IP addresses. An automated method
of assigning IP addresses to workstations is called:
a. POST
b. ARP
c. RARP
d. DHCP
66
26. What type of DNS record is used to specify mail servers?
a. Mail slots
b. AAAA
c. A
d. MX
28. You are assisting an application developer with filling out a load balancing request. The
developer wants all http requests to be forwarded to the default https port. How would you
advise the developer to fill out the request?
a. The load balancer should listen on tcp port 443 and forward to tcp port 80
b. The load balancer should listen on tcp port 80 and forward to tcp port 445
c. The load balancer should listen on tcp port 80 and forward to tcp port 443
d. The load balancer should listen on tcp port 80 and forward to tcp port 80
29. You have been tasked with finding the routers that have been installed between two networks.
What utility would you use to provide this information?
a. tracert
b. ipconfig
c. route PRINT
d. route CHANGE
30. You have been tasked with finding a subnet mask large enough to accommodate an address
space of 1000 addresses as efficiently as possible. What subnet mask do you use?
a. 255.255.255.0
b. 255.0.0.0
c. 255.255.252.0
d. 255.255.0.0
67
34. What is the address range for a private Class A network?
a. 8.0.0.0-8.255.255.255
b. 192.168.0.0-192.168.255.255
c. 172.15.0.0-172.32.255.255
d. 10.0.0.0-10.255.255.255
35. What is the last assignable address on the 192.168.50.0 255.255.255.248 network?
a. 192.168.50.7
b. 192.168.50.6
c. 192.168.50.254
d. 192.168.50.8
36. Your colleague is having trouble converting CIDR notation to regular decimal format. He has
been tasked to find the decimal format subnet mask for a /23 network. What do you tell him?
a. 255.255.255.0
b. 255.255.255.128
c. 255.255.0.0
d. 255.255.254.0
39. What is the maximum number of hosts on the 192.168.50.0 255.255.255.252 network?
a. 2
b. 4
c. 254
d. 12
40. What command(s) would be used to send a continuous stream of packets to a target IP address?
a. ping -t
b. ping -l
c. ping localhost
d. netstat -ano
68
Network Fundamentals
1. What is the network ID of the following IP address? 192.168.1.1 255.255.255.0
a. 192.0.0.0
b. 192.168.0.0
c. 192.168.1.0
d. 192.168.1.1
4. Storing data or hosting services or software with providers accessed through the internet is referred
to as using a ___________provider
a. Cloud
b. Host
c. Storage
d. Mobile
5. What is the network authentication protocol that is ticket based and provides mutual
authentication?
a. NTLM
b. Active Directory
c. Kerberos
d. DHCP
6. A host has an IP Address of 169.254.1.1. What does this indicate
a. DHCP server is unavailable
b. DNS is unavailable
c. Active Directory is unavailable
d. Group Policy is unavailable
7. When a client reaches their default gateway, which hardware device are they accessing?
a. Switch
b. Proxy
c. Router
d. VLAN
8. A common means of connecting one site to another for the purpose of access and information
sharing is known as _____________
a. Dial-up
b. LAN Extension
c. A VPN
d. Extranet
69
9. Resolving a user-friendly name to an IP address is performed by which service?
a. DHCP
b. DNS
c. RAS
d. IPSec
10. Why are the individual wires twisted in twisted pair cable?
a. To prevent crosstalk
b. To increase the distance signal can travel
c. To increase the speed data can travel
d. To increase distortion
12. A user can ping a host by IP address, but not by name. What is likely the problem?
a. DHCP
b. ARP
c. ICMP
d. DNS
15. The open protocol that is in use on most networks, including the internet is called ________
a. TCP/IP
b. IPX/SPX
c. Netbeui
d. Powershell
16. The minimum length for a password on a medium security network should be is
__________characters
a. Four
b. Eight
c. Twelve
d. Fifteen
70
17. What is the type of cable most commonly in used in local networks today?
a. Coaxial
b. Unshielded Twisted Pair
c. Fiber Optic
d. Thin net
19. What is a way to limit the ability of an attacker to guess user passwords?
a. Enforce complexity requirements through group policy
b. Trust users to create good passwords and protect them
c. Encourage users to write passwords down
d. Assign passwords to users and force them to change the passwords at first login
22. In relation to IP addressing, what indicates the portion of the address that is network id and the
portion that is host id?
a. Frame mask
b. Element id
c. Subnet mask
d. Packet
71
25. What is the address that is bound to a network card and should not change regardless of where
the device is located?
a. MAC address
b. IP address
c. Frame Address
d. DNS Address
29. A means of distributing security rules and configuration to multiple systems is through the use of
____________
a. Access lists
b. Group policy
c. Firewalls
d. Routers
32. An area of the network that is segmented from the LAN that is reserved for systems to which the
public will have access (for instance, web servers) is called _____________
a. Intranet
b. DMZ
c. Public domain
d. Subnet
72
33. In order to limit the disclosure of data on a network, which process is helpful?
a. Encryption
b. Enumeration
c. Elevation
d. Escalation
35. The means that allows a user to log-in once to the domain and access many resources is called
a. Super Sign-on
b. Single Sign-on
c. Peer-to-Peer networking
d. Open Access
36. What utility is used to show a host’s IP address, Subnet Mask, and default gateway?
a. PING
b. Telnet
c. SSH
d. Ipconfig
38. What protocol is responsible for transmitting mail from one mail server to another?
a. IPSec
b. SNMP
c. SMTP
d. RTP
40. A common problem with network cable is that signal degrades over distance. What is this called?
a. Amplification
b. Distortion
c. Attenuation
d. Elimination
73
Fundamental System Security
1. Which technology prevents unauthorized viewing of databases?
a. Cloud encryption
b. Database encryption
c. Mobile device
d. Individual file encryption
2. Which technologyh allows a PC to contain multiple operating systems that can only be used one at
a time?
a. Hypervisor
b. MultiBoot
c. System boot
d. Safe mode
6. Which process typically takes less time, server-side validation, or client-side validation?
a. Both are equal
b. Server-side validation
c. Client-side validation
d. Neither
74
9. Can all removable media support encryption?
a. Yes
b. No
c. 0
d. 0
10. How would an end user prevent a XSS (cross-site scripting) attack?
a. Use anti-malware or anti-spyware programs
b. Input validation
c. Deploy security patches based on the signatures of malware
d. Take password off the computer
12. Which technology can be used to erase a lost or stolen mobile device?
a. Device encryption
b. Remote wipe
c. Remote backup
d. Police mode
13. Multiple virtual machines with different operating systems can be used at the same time.
a. TRUE
b. FALSE
c. 0
d. 0
14. Which state is data in when sending an email?
a. Data in motion
b. Data in use
c. Data at rest
d. All of the above
15. Which item describes a text file pushed to your system to log your user preferences?
a. Brownie
b. Spyware
c. Cookie
d. Malware
75
18. Which control prevents unauthorized use of a mobile device?
a. Screen saver
b. Screen lock
c. Screen protector
d. Phone case
19. Which technology is a specialized crypto processor designed to address large encryption
calculations?
a. HSM
b. SLM
c. TMP
d. DDOS
23. Which technology protects our email inbox from malicious users?
a. Anti-malware software
b. Anti-spam or spam filters
c. Anti-spyware
d. Pop-up blockers
24. If an hard disk is encrypted, why would file encryption also be required?
a. In case the file will be sent over the Internet
b. In case the file will be moved to another hard drive
c. In case the file will be copied to a USB device
d. All of the above
25. Which process should be used to remove PII from a mobile device?
a. Sterilization
b. Recycling
c. Sanitization
d. deletion
76
26. What is the best form of security for lost or stolen mobile devices?
a. Device encryption
b. Screen lock
c. passwords
d. Screen protector
33. How could an organization prevent users from taking office laptops home?
a. Cable lock
b. Locking cabinets
c. Safe
d. An anchor
34. Using Application Patch Management what step should be taken first?
a. Validate that patch is from the correct manufacturer
b. Test the patch
c. Migrate the patch to user’s computer for use
d. none of the above
77
35. Which type of encryption works on an entire hard drive?
a. Full disk
b. Database
c. Removable media
d. Mobile device
36. What would be affected if the configuration of items in locking cabinets was changed?
a. Confidentiality
b. Integrity
c. Availability
d. None of the above
78
Communication and Network Security
1. What is A type of malicious code that lays dormant until logical event occurs?
a. Logic Bomb
b. Time Bomb
c. Net Bomb
d. Logic Worm
3. What is an Attack that involves someone changing the physical address and replacing it with the
desired attackers server?
a. MAC Spoofing
b. WiredSpoofing
c. RFI Attack
d. ARP Posioning
4. As you move up the OSI Model you gain intelligence for your devices and lose ______?
a. Security
b. Money
c. Speed
d. a lot
8. What protocol is behind echoing utilities like PING and TraceRoute, and is also frequently exploited?
a. ICMP
b. IP
c. IKE
d. IGMP
79
9. What layer switch is necessary for inter-VLAN communications?
a. 2
b. 4
c. 1
d. 3
12. What is a controversial computer program designed for remote system administration. It enables a
user to control a computer running the Microsoft Windows operating system from a remote location.
The name is a play on words on Microsoft BackOffice Server software?
a. Net Bus
b. Back Orifice
c. SubSeven
d. Notepad ++
13. What type of non flex cable, where speed was originally limited to 10mbps and though it may be
more secure than some, it is still susceptible to vulnerabilities?
a. Coaxial
b. Twisted Pair
c. Fiber Optic
d. Time Warner
15. What physical topology is the most fault tolerant and fully redundant?
a. Bus
b. Ring
c. Star
d. Mesh
16. What OSI Data Link Layer and Physical layer map to on the TCP/IP layer?
a. Application
b. Network Access
c. Host to Host Transport
d. Internet
80
17. What do you need to get broadcast isolation on a switch?
a. Router
b. Hub
c. VLAN
d. LAN
18. What type of Media Access Control resembles a classroom, with everyone having an open forum
to ask questions, without raising their hands?
a. CSMA/CD
b. CSMA/CA
c. Token Passing
d. Token Taking
22. Name this Attack: Type of attack that exploits the three way handshake of TCP. Layer 4 attack.
Stateful firewall is needed to prevent.
a. Salami
b. Trojan Horse
c. Syn flood
d. none of the above
23. What is similar to a virus, but does not need a host and is self replicating?
a. Time Bomb
b. Wardialing
c. Worm
d. Session Hijacking
81
25. On What OSI layer does a Smurf attack happen?
a. Layer 4
b. Layer 3
c. Layer 5
d. Could happen on any layer
26. What type of Fiber Optic Cable is used for communications over short distances?
a. MultiMode
b. Single Mode
c. CAT5
d. RG-59
29. You have been asked to perform a side assessment for your new data center, and to recommend
the type of cabling to be used, What Cabling do you use, keeping in mind your boss has asked you to
keep costs low?
a. Coaxial
b. Twisted Pair
c. Twisted Group
d. Fiber Optic
82
33. What is not an aspect of the Application layer?
a. Application Proxies
b. Switches
c. Content Inspection
d. Non-Repudiation
34. For the purpose of our study, what is the only protocol that starts with the letter (I), that does not
function at layer 3?
a. ICMP
b. IP
c. IKE
d. IMAP
37. What layer of the TCP/IP Model and OSI Model would you find a kernel firewall?
a. Network Access(TCP/IP) and Data Link (OSI)
b. Network Access(TCP/IP) and Physical(OSI)
c. Application(TCP/IP) and Application(OSI)
d. Application(TCP/IP) and Presentation(OSI)
83
Network Devices
1. Promiscuous Mode on a Network Interface Card allows
a. Allows a NIC to pick up any traffic regardless of destination MAC address
b. Allows a NIC to communicate even if other systems communicating at the same time
c. Allows a switch to broadcast using ARP
d. Detect collisions
2. [Access-list 102 deny TCP any any eq 23] serves what purpose on a router or firewall?
a. Blocks all tcp traffic
b. Blocks TCP traffic but allows traffic on port 23
c. Blocks all telnet traffic
d. Limits remote connections to 23 connections
3. A Troubleshooting utility used to track traffic as it hops across routers and to determine at what
point is experiencing delays for remote traffic
a. PING
b. Traceroute
c. Redirect
d. Hops
6. What are the default connections for MOST home routers and access points?
a. IP: 192.168.0.1 administrative account: admin, password: admin (or password)
b. IP: 10.10.10.1 administrative account: administrator, password: admin (or password)
c. IP: randomly assigned, administrative account: administrator, password: admin (or
password)
d. IP: dynamically assigned, administrative account: admin, password: admin (or password)
84
9. What are the characteristics of a router?
a. Broadcast domain isolation
b. Use of Fully Qualified Domain Names
c. Use of MAC addresses
d. Shared broadcast domains
10. To configure a switch to allow the effective connection of an Intrusion Detection System, what
must be configured on the switch?
a. Promiscuous mode
b. Port Span
c. Network Address Translation
d. Port Address Translation
85
17. What is the main purpose of a router—single answer?
a. To provide broadcast isolation
b. To allow systems to connect on a local subnet
c. To provide high-end packet inspection at layer 7
d. To provide content inspection from trusted networks to untrusted
19. Which of the following devices that might reasonably be located in a DMZ?
a. Domain Controller
b. Key Distribution Center
c. Web Server
d. LDAP server
21. The success of a Network Access Control server depends on the client ability to
a. Provide proof of health
b. Respond to authentication requests
c. Quickly remediate problems
d. Access
86
25. In order to connect to an IP network, what configuration is MANDATORY?
a. DHCP
b. IP of Domain Controller
c. Broadcasts
d. IP address and Subnet Mask
28. Why does a router offer better functionality than a VLAN implementation on a standard switch?
a. Routers are cheaper than switches
b. Routers are faster than switches
c. Routers allow intra-VLAN communications
d. Standard switches are layer 2 and designed to use MAC addressing while, Routers (or layer
3 switch) can allow the VLAN to communicate with each other
30. Devices that would inspect traffic destined for the DMZ would be
a. DNS Server
b. Honey Pot
c. Web Application Firewall
d. Proxy Server
87
33. An IDS that requires a baseline of the network is called
a. Behavior-based
b. Definition-based
c. Signature-based
d. Statistical
36. Which Wireless encryption standard was the first to require WPA II?
a. 802.11a
b. 802.11b
c. 802.11 n
d. 802.11ac
38. In a typical network environment, how do client systems know how to contact a domain controller
to authenticate
a. They are manually configured with the domain controller’s address
b. DHCP provides the address
c. DNS Provides the address through the use of its SRV records
d. The client broadcasts a request
88
40. [Access-list 101 deny TCP 10.1.1.1 192.168.1.1 eq 22] serves what purpose on a router or firewall?
a. Blocks all SSH traffic from addresses 10.1.1.1 and 192.168.1.1
b. Blocks SCP traffic from 10.1.1.1 to 192.168.1.1
c. Blocks all SSH Traffic from 192.168.1.1 to 10.1.1.1
d. Blocks ALL traffic from 10.1.1.1 to 192.168.1.1
89
IDS/IPS
1. Which technology may be installed on a host is likely to negatively impact system performance?
a. NIDS
b. NIPS
c. HIDS
d. Sniffer
2. Which term best describes analysing the condition of systems and networks in order to remediate
any problems?
a. Proportionality of response
b. Passive defence
c. Active defence
d. None of the above
5. In order for a device to eavesdrop on communications, which of the following must be true?
a. The network device’s interface must be configured with a SPAN port
b. The network interface must be configured as a listener
c. The network interface must be configured in promiscuous mode
d. The device must be plugged into a switch
90
8. Which technology is required to block traffic leaving the network?
a. Ingress Filtering
b. Egress Filtering
c. Stateful filtering
d. Packet filtering
9. A new IDS is generating many irrelevant log entries. Which action would best remedy this problem?
a. Change the IDS to use a heuristic anomaly filter
b. Adjust IDS filters to increase the clipping levels
c. Change the IDS filter to data mine the false positives for statistical trending data
d. Adjust IDS filters to increase the number of false positives
13. Which IDS evasion technique uses a non-standard character set in order to avoid detection?
a. Confusion
b. Diffusion
c. Obfuscation
d. Masking
91
16. Which type of IDS cannot protect against a zero-day exploit?
a. Signature
b. Anomaly
c. Behavior
d. Heuristic
17. Which type of firewall only examines the packet header information?
a. Stateful firewall
b. Kernel proxy firewall
c. Packet-filter firewall
d. Application-level proxy firewall
20. A protocol analyzer captured the traffic below. What type of traffic is it? INVITE
sip:[email protected] SIP/2.0 Via: SIP/2.0/UDP pc33.atlanta.com;branch=z9hG4bK776asdhds Max-
Forwards: 70 To: Bob From: Alice ;tag=1928301774 Call-ID: [email protected]
CSeq: 314159 INVITE Contact: Content-Type: application/sdp Content-Length: 142
a. Broadcast
b. VOIP
c. EMAIL
d. FTP
21. A WAF without customization will protect the infrastructure from which of the following attack
combinations?
a. DoS, DNS poisoning, and pharming
b. JavaScript and Active X controls
c. SQL injection, XSS, and HTTP exhaustion
d. SQL injection, browser hijacking, and clickjacking
92
24. Which of the following types of traffic would generate the below alert? alert icmp any any -> any
any (msg:"ALERT"; classtype:not-suspicious; sid:2000001; rev:1;)
a. TCP Syn/Ack
b. TCP Syn
c. TCP Ack
d. ping
e. All IP traffic
25. What is the technique called for of enumerating the ruleset of a firewall?
a. Firewalking
b. Firedumping
c. Firecracking
d. Firelisting
26. Which technology prevents internal systems from being used as zombies in an attack on another
network?
a. Ingress Filtering
b. Egress Filtering
c. IDS
d. Honeypot
27. Which type of IDS uses a “learning mode” to establish a network traffic baseline?
a. Signature-based
b. Anomaly-based
c. Rule-based
d. Knowledge-based
28. Circuit level firewalls operate at which layer of the OSI Model?
a. 3
b. 4
c. 5
d. 7
29. Which technique describes blocking all traffic except that which is explicitly allowed?
a. Open-listing
b. Closed-listing
c. Whitelisting
d. Blacklisting
93
32. Which statement correctly describes an insertion attack?
a. Injecting malicious code into the data stream in order to compromise a system
b. Another term for session hijacking
c. Adding spurious code to modify the attack’s signature without changing the payload
d. A type of buffer overflow
33. An IDS is known as a passive device. Which of the following is NOT a passive response?
a. Sending a TCP reset
b. Alerting an administrator
c. Creating an entry in a log file
d. Inspection of current traffic on the network
34. Which one of the following is true of a Host-based Intrusion Detection System? (HIDS)
a. It captures network traffic
b. Has a quick response with zero-day attacks
c. Recognizes and reports report alterations to the registry and data files
d. Alerts on to known intrusion patterns
35. Which of the following details pieces can NOT be examined by a packet-filter firewall?
a. IP
b. URL
c. Port
d. Protocol
37. In the event of a conflict in the ruleset of a firewall, which rule will be applied?
a. The first rule
b. The last rule
c. The conflicting rules cancel each other out
d. Certain types of traffic are prioritized, which is used for conflict resolution
39. A security administrator uses a honeypot to create a website in the DMZ, encouraging users to
“Click here for free music!!!”. The admin then pursues action for trespassing against those who click
the link. What is this technique called?
a. Enticement
b. Entrapment
c. Fourth amendment violation
d. An appropriate use of a honeypot
94
40. Which type of IDS requires a network performance baseline?
a. Signature-based
b. RFC-based
c. Knowledge-based
d. Anomaly-based
95
End User Security Fundamentals
1. An authentication server stores both the username and the password.
a. TRUE
b. FALSE
c. 0
d. 0
96
9. Pretexting is synonymous with what?
a. Investigation
b. Impersonation
c. Interrogation
d. Infiltration
10. _______ dollars were lost in the Unites States last year due to cyber attacks.
a. 250 Million
b. 25 Billion
c. 250 Billion
d. 500 Billion
11. A digital signature provides assurance that the file has not been modified.
a. TRUE
b. FALSE
c. 0
d. 0
14. Which of the following requires the safe storage of data generated in connection with public
electronic information?
a. Data Directive
b. Payment Card Industry Data Security Standards
c. Data-Driven Marketing
d. Data Security, Portability, and Accountability Act
97
17. Corrupted files are a violation of _______
a. Confidentiality
b. Integrity
c. Accessibility
d. None of the above
98
End User Email
1. Clicking on suspicious links and download unverified attachments puts you and only at risk.
a. TRUE
b. FALSE
c. 0
d. 0
2. Which of the following is an indicator of a suspicious email?
a. Bad grammar
b. A sense of urgency
c. Promise of money
d. All of the above
4. Which of these is NOT a method you can use to keep your inbox clean from unwanted email?
a. Be careful with who you give your email address to
b. Bulk delete all emails without opening any up
c. Use different email addresses for different purposes
d. Remove email subscriptions once you do not need them anymore
5. If you receive a malicious email to your company email address, you should forward it to other
people.
a. True - everyone needs to know what malicious emails look like, and you increase awareness
by forwarding this email
b. True - you should forward the email to the security team so they can take the proper steps
to handle the email
c. False - forwarding the email to anyone could result in extended damage to the network
d. False - you should gather more information about the email by responding to it before
taking any additional steps
6. The email address shown next to the name of the sender in an email header is always the address
your replies will be sent to.
a. TRUE
b. FALSE
c. 0
d. 0
7. If you receive a malicious email to your company email address, you should forward it to other
people.
a. True - everyone needs to know what malicious emails look like, and you increase awareness
by forwarding this email
b. True - you should forward the email to the security team, so they can take the proper steps
to handle the email
c. False - forwarding the email to anyone could result in extended damage to the network
d. False - you should gather more information about the email by responding to it before
taking any additional steps
99
8. Which of the following is not a threat an attachment can pose?
a. Installing adware
b. Propagate to other people on your contacts list
c. Installing a keylogger
d. Fry your computer
10. Which of these is NOT a method you can use to keep your inbox clean from unwanted email?
a. Be careful with who you give your email address to
b. Bulk delete all emails without opening any up
c. Use different email addresses for different purposes
d. Remove email subscriptions once you do not need them anymore
11. An email link that sends you to an inappropriate website is an example of a malicious email attack.
a. TRUE
b. FALSE
c. 0
d. 0
12. What is phishing?
a. Encrypting the data on a computer and asking for a ransom to decrypt it
b. Manipulating people to get them to share personal information such as login credentials
c. Getting a person to perform a cyber-attack on others
d. Email attacks that infect the computers of a large number of people
13. Which of the following is a step you should take to make sure a link contained in an email is safe?
a. Directly follow the link
b. Share the link to check for complaints
c. Check to make sure the sender of the email is who they claim to be
d. Copy and paste the link in Google to check for authenticity
14. What are the warning signs of a suspicious email??
a. Poor grammar and unsolicited downloads
b. Sense of urgency and scare tactics
c. "Too good to be true"
d. All of the above
16. Which of the following should you NOT do when you receive a possible phishing email?
a. In case the sender is someone you believe you know, confirm that they did in fact send the
email
b. Navigate to logins manually instead of clicking on links
c. Run a virus scan on any opened or downloaded attachments
d. Reply back to the email
100
17. All suspicious emails should be forwarded to your security team.
a. TRUE
b. FALSE
c. 0
d. 0
19. Which of these is NOT a reason for the prevalence of email attacks?
a. People are still falling for these attacks, even when they are very poorly done
b. Targeting specific people is very efficient
c. Generic attacks that affect a mass population are very easy
d. Sending links to phishing sites is easier than through other modes of communication, such
as by phone
101
End User PII
1. Always give the ________ amount of PII if it becomes absolutely necessary.
a. Total Available
b. Least
c. Requested
d. Most
4. Which of the following is a poor organizational practice concerning the protection of PII?
a. Frequently transmitting PII over networks
b. Storing PII redundantly on numerous servers and/or portable devices
c. Letting PII be used by numerous people within the organization
d. All of the above
102
9. What does HIPAA stand for?
a. Health Insurance Portability and Accountability Act
b. Healthcare Industry Professionals Accountability Administration
c. Healthcare Insurance Portability and Aggregation Act
d. Health Insurance Portability and Accountability Administration
12. Which of the following is NOT an important factor in determining the ease of access of PII?
a. Can be copied, sent, and saved without restriction
b. Is available for use by HR for employee management
c. Is protected by passwords before being accessible by staff
d. The volume of PII stored
15. Before giving out individual PII, what is the first thing you must do?
a. Ensure that the request is authorized, and the requester provides legitimate identification
b. Check with the individual to get their approval
c. Check with company policy for instructions dictating the process of handing out PII
d. Encrypt the PII for transfer, so it does not get in the hands of external parties
103
18. Where should you store confidential information?
a. Personal Laptop
b. SD Card
c. Phone
d. None of the above
20. If a single piece of information cannot be used by itself to identify a person, it is safe to reveal.
a. TRUE - if the information does not distinguish the individual from others, there is no issue
with it being revealed
b. FALSE - that information may be combined with other pieces of information to identify a
particular individual
c. 0
d. 0
21. PII can be used to commit identity theft. Identity theft can cause which of the following issues?
a. Financial problems
b. Credit hits
c. Emotional distress
d. All of the above
104
End User Physical Security
1. Why is physical security in an organization important?
a. Employees could come to harm
b. Network devices could be destroyed, severely harming the organization
c. Cyber-attacks could be performed on site that may be more disastrous than a remote attack
d. All of the above
3. Which of the following can you do if someone is struggling to get through a security door?
a. Offer to swipe your ID for them
b. Hold the door open for them
c. Escort them to security
d. None of the above
4. Which of the following is the first step you should take when dealing with physical security?
a. Mitigate
b. Report
c. Identify
d. None of the above
7. In the event of an emergency, the only concern should be safety of employees. Safety of sensitive
data can be disregarded.
a. TRUE
b. FALSE
c. 0
d. 0
8. Which of the following practices ensures that door locks are being used effectively?
a. Propping doors open
b. Writing door pin codes on the door
c. Holding doors for people who have not scanned their badge in
d. None of the above
105
9. What key combination for Windows/Mac quickly locks your computer?
a. Win+R/Cmd+R
b. Shift+Tab/Cntrl+Tab
c. Alt+F4/Cmd+Option+Esc
d. Win+L/Cntrl+Shift+Power
10. The safety of a company employees is more important the safety of its data.
a. TRUE
b. FALSE
c. 0
d. 0
11. If you spot someone making an attempt to enter your company building without going through
the proper identification process but you are uncomfortable with accosting them, you may report
the attempt to security instead.
a. TRUE
b. FALSE
c. 0
d. 0
12. Which of the following is NOT a reason for organizations being vulnerable?
a. People take extensive care to follow all company policies
b. People are not careful with their credentials
c. Buildings are designed for function with cost in mind rather than security
d. All of the above are reasons for vulnerability
16. An attacker with physical access to the target computer can do which of the following that they
normally would not be able to from a remote location?
a. Access the computer through the network
b. Upload a virus wirelessly
c. Physically destroy the computer
d. Learn when it is turned on
106
17. Which of the following is an effective method of preventing your laptop from being stolen?
a. Covering your laptop in sticky notes
b. Using a computer lock
c. Putting your laptop under your desk
d. Using a screensaver
19. If someone looks like they are trying to tailgate behind you, what should you do?
a. Visually verify their ID before letting them follow you
b. Kindly escort them to security
c. Slam the door behind you, so they are unable to follow
d. Demand that they swipe themselves in and refuse to open the door
20. The only way to access information in a password protected computer is by logging in with a
password.
a. TRUE
b. FALSE
c. 0
d. 0
21. An attack over USB can be more effective than an attack performed over the network.
a. TRUE
b. FALSE
c. 0
d. 0
107
End User: Network Security
1. A worm is dangerous because
a. It only requires one user on the network to allow it to spread wildly
b. It installs programs that users do not want
c. It monitors network traffic.
d. None of the above
4. IP comes from the ______ range when the government wanted to send files between systems.
a. 60
b. 70
c. 80
d. 90
8. Network security begins with ___________, usually with a username and password.
a. Auditing
b. Authenticating
c. Fabrication
d. None of the above
108
9. A man in the middle attack only leads to watching network traffic, not corruption, of data or
stealing.
a. TRUE
b. FALSE
c. 0
d. 0
14. How could someone view data sent over a network transmitted in HTTPS?
a. You have antivirus in place
b. You are on a public network
c. You are using a wireless network
d. None of the above
109
18. The most important part of network security is:
a. Protecting data in transit
b. Protecting user login credentials
c. Maintaining accessibility
d. None of the above
110
End User: Cyber Fundamentals
1. Social Engineering is
a. The act of manipulating data to secure PII
b. The act of manipulating people for malicious means
c. The act of organizing PII based on social security numbers
d. The act of organizing PII based on social groups
111
9. An email with a known sender is safe from phishing.
a. TRUE
b. FALSE
c. 0
d. 0
15. A digital signature provides insurance that the file has not been modified.
a. TRUE
b. FALSE
c. 0
d. 0
16. Which of the following requires the safe storage of data generated in connection with public
electronic information?
a. Data Directive
b. Payment Card Industry Data Security Standards
c. Data-Driven Marketing
d. Data Security, Portability, and Accountability Act
112
17. _______ dollars were lost in the Unites States last year due to cyber attacks.
a. 250 Million
b. 25 Billion
c. 250 Billion
d. 500 Billion
113