Cyber Exam
Quiz by Mrs. Sinardi
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
140 questions
Show answers
- Q1Your organization’s security policy states that administrators should follow the principle of least privilege. Which of the following tools can ensure that administrators are following the policy?Risk assessmentVulnerability assessmentUser rights and permissions reviewThreat assessment20s
- Q2Someone stole an executive’s smartphone, and the phone includes sensitive data. What should you do to prevent the thief from reading the data?Encrypt the data on the phonePassword-protect the phoneTrack the location of the phoneUse remote wipe20s
- Q3Your organization routinely hires contractors to assist with different projects. Administrators are rarely notified when a project ends and contractors leave. Which of the following is the BEST choice to ensure that contractors cannot log on with their account after they leave?Enable an account enablement policyEnable an account recovery policyEnable generic accountsEnable account expiration20s
- Q4Maggie reports that when she is at her desk, she can pick up a wireless signal with her laptop. However, when she is in other locations of the building, such as in one of the conference rooms, she no longer has access to the Internet. Which of the following is the MOST likely reason for this problem?IP address conflictWireless RF signals are weakMAC filtering is blocking access in the conference roomIncorrect SSID configured20s
- Q5Employees access a secure area by entering a cipher code, but this code does not identify individuals. After a recent security incident, management has decided to implement a key card system that will identify individuals who enter and exit this secure area. However, the installation might take six months or longer. Which of the following choices can the organization install immediately to identify individuals who enter or exit the secure area?CCTVAccess listBollardsMantrap20s
- Q6What is a virtual switch?A switch used for a virtual LANA logical switch that functions like a physical switchA switch used for VPNsA planned change20s
- Q7While analyzing a packet capture log, you notice the following entry: 16:12:50, src 10.80.1.5:3389, dst 192.168.1.100:8080, syn/ack Of the following choices, what is the BEST explanation of this entry?An HTTP connection attemptAn RDP connection attemptAn FTP connection attemptA buffer overflow attack20s
- Q8You are reviewing logs from a wireless survey within your organization’s network due to a suspected attack and you notice the following entries: MAC SSID Encryption Power 12:AB:34:CD:56:EF GetCertifiedGetAhead WPA2 47 12:AB:34:CD:56:EF GetCertifiedGetAhead WPA2 62 56:CD:34:EF:12:AB GetCertifiedGetAhead WPA2 20 12:AB:34:CD:56:EF GetCertifiedGetAhead WPA2 57 12:AB:34:CD:56:EF GetCertifiedGetAhead WPA2 49 Of the following choices, what is the MOST likely explanation of these entries?The AP is being pharmedAn evil twin is in place..A rogue AP is in place.Power of the AP needs to be adjusted.20s
- Q9A user wants to reduce the threat of an attacker capturing her personal information while she surfs the Internet. Which of the following is the BEST choice?Anti-spyware softwareAntivirus softwareWhitelistingPop-up blocker20s
- Q10Which of the following protocols is commonly used by the traceroute utility?SNMPNetBIOSRDPICMP20s
- Q11After Maggie turned on her computer, she saw a message indicating that unless she made a payment, her hard drive would be formatted. What does this indicate?TrojanArmored VirusRansomwareBackdoor20s
- Q12You maintain a training lab with 18 computers. You have enough rights and permissions on these machines so that you can configure them as needed for classes. However, you do not have the rights to add them to your organization’s domain. Which of the following choices BEST describes this example?Separation of DutiesUser-Based PrivilegesNeed-to-KnowLeast Privilege20s
- Q13You are helping your organization create a security policy for incident response. Of the following choices, what is the BEST choice to include when an incident requires confiscation of a physical asset?Keep a record of everyone who took possession of the physical assetEnsure hashes are taken firstMaintain the order of volatilityEnsure witnesses sign an AUP20s
- Q14A network administrator needs to ensure the company’s network is protected against smurf attacks. What should the network administrator do?Install flood guardsEnsure protocols use timestamps and sequence numbersVerify border routers block directed broadcasts.Use salting techniques20s
- Q15What cloud-based service provides you with hardware, but still requires you to setup, configure, and manage the software?Hybrid CloudIaaSPaaSSaaS20s