Your browser does not support JavaScript!

Electronics 1: Electronic Devices and Circuits

Showing 151-169 of 169 answers

What three items are components of the CIA triad? (Choose three.)
  • availability confidentiality integrity Correct
What tool is used to lure an attacker so that an administrator can capture, log, and analyze the behavior of the attack?
  • honeypot Correct
What type of attack disrupts services by overwhelming network devices with bogus traffic?
  • DDoS Correct
What type of attack uses zombies?
  • DDoS Correct
When describing malware, what is a difference between a virus and a worm?
  • A virus replicates itself by attaching to another file, whereas a worm can replicate itself independently. Correct
Which configuration on a wireless router is not considered to be adequate security for a wireless network?
  • prevent the broadcast of an SSID Correct
Which example illustrates how malware might be concealed?
  • An email is sent to the employees of an organization with an attachment that looks like an antivirus update, but the attachment actually consists of spyware. Correct
Which method is used to check the integrity of data?
  • checksum Correct
Which protocol is used by the Cisco Cyber threat Defense Solution to collect information about the traffic that is traversing the network?
  • NetFlow Correct
Which stage of the kill chain used by attackers focuses on the identification and selection of targets?
  • reconnaissance Correct
Which statement describes cybersecurity?
  • It is an ongoing effort to protect Internet-connected systems and the data associated with those systems from unauthorized use or harm. Correct
Which statement describes cyberwarfare?
  • It is Internet-based conflict that involves the penetration of information systems of other nations. Correct
Which technology creates a security token that allows a user to log in to a desired web application using credentials from a social media website?
  • Open Authorization Correct
Which technology removes direct equipment and maintenance costs from the user for data backups?
  • a cloud service Correct
Which tool can identify malicious traffic by comparing packet contents to known attack signatures?
  • IDS Correct
Which tool can perform real-time traffic and port analysis, and can also detect port scans, fingerprinting and buffer overflow attacks?
  • Snort Correct
Which two tools used for incident detection can be used to detect anomalous behavior, to detect command and control traffic, and to detect infected hosts? (Choose two.)
  • intrusion detection system NetFlow Correct
Which type of technology can prevent malicious software from monitoring user activities, collecting personal information, and producing unwanted pop-up ads on a user computer?
  • antispyware Correct
Why do IoT devices pose a greater risk than other computing devices on a network?
  • Most IoT devices do not receive frequent firmware updates. Correct
All courses