What three items are components of the CIA triad? (Choose three.)
availability confidentiality integrityCorrect
What tool is used to lure an attacker so that an administrator can capture, log, and analyze the behavior of the attack?
honeypotCorrect
What type of attack disrupts services by overwhelming network devices with bogus traffic?
DDoS Correct
What type of attack uses zombies?
DDoSCorrect
When describing malware, what is a difference between a virus and a worm?
A virus replicates itself by attaching to another file, whereas a worm can replicate itself independently. Correct
Which configuration on a wireless router is not considered to be adequate security for a wireless network?
prevent the broadcast of an SSID Correct
Which example illustrates how malware might be concealed?
An email is sent to the employees of an organization with an attachment that looks like an antivirus update, but the attachment actually consists of spyware.Correct
Which method is used to check the integrity of data?
checksumCorrect
Which protocol is used by the Cisco Cyber threat Defense Solution to collect information about the traffic that is traversing the network?
NetFlow Correct
Which stage of the kill chain used by attackers focuses on the identification and selection of targets?
reconnaissanceCorrect
Which statement describes cybersecurity?
It is an ongoing effort to protect Internet-connected systems and the data associated with those systems from unauthorized use or harm.Correct
Which statement describes cyberwarfare?
It is Internet-based conflict that involves the penetration of information systems of other nations. Correct
Which technology creates a security token that allows a user to log in to a desired web application using credentials from a social media website?
Open AuthorizationCorrect
Which technology removes direct equipment and maintenance costs from the user for data backups?
a cloud service Correct
Which tool can identify malicious traffic by comparing packet contents to known attack signatures?
IDS Correct
Which tool can perform real-time traffic and port analysis, and can also detect port scans, fingerprinting and buffer overflow attacks?
Snort Correct
Which two tools used for incident detection can be used to detect anomalous behavior, to detect command and control traffic, and to detect infected hosts? (Choose two.)
intrusion detection system NetFlowCorrect
Which type of technology can prevent malicious software from monitoring user activities, collecting personal information, and producing unwanted pop-up ads on a user computer?
antispyware Correct
Why do IoT devices pose a greater risk than other computing devices on a network?
Most IoT devices do not receive frequent firmware updates. Correct