Assignment
Assignment
Assignment
Name
Outlook Email;
Highlight the answers in Yellow
1) Which of the following firewalls hides or masquerades the private addresses of network
hosts?
• Reverse proxy firewall
• Host-based firewall
• Proxy server
2) Carrying out a multi-phase, long-term, stealthy and advanced operation against a specific
• Network sniffing
• Social engineering
• Script kiddies
• Rainbow tables
3) You are configuring access settings to require employees in your organization to authenticate
first before accessing certain web pages. Which requirement of information security is
• Scalability
• Availability
• Integrity
• Confidentiality
2
4) An organization is experiencing overwhelming visits to a main web server. You are developing
a plan to add a couple of more web servers for load balancing and redundancy. Which
• Scalability
• Integrity
• Confidentiality
• Availability
5) What of the following are examples of cracking an encrypted password? (Choose four correct
answers)
• Intimidation
• Network sniffing
• Rainbow tables
• Social engineering
• Spraying
• Dictionary attack
6) Improper management of physical access to a resource, such as a file, can lead to what type of
security vulnerability?
• Race conditions
• Buffer overflow
• Non-validated input
3
7) A medical office employee sends emails to patients about their recent visits to the facility.
What information would put the privacy of the patients at risk if it was included in the email?
• Contact information
• Next appointment
• Patient records
8) You are surfing the Internet using a laptop at a public Wi-Fi cafe. What should you check first
9) Which technology creates a security token that allows a user to log in to a desired web
• Open authorization
• VPN service
• Password manager
10) Which of the following firewalls filters traffic based on source and destination IP addresses?
• Proxy server
11) Which of the following firewalls filters web content requests such as URLs and domain names?
• Proxy server
12) Which of the following items are states of data? (Choose three correct answers)
• Storage
• Text
• ASCII
• Transmission
• Binary
• Processing
13) What action will an IDS take upon detection of malicious traffic?
14) You have stored your data on a local hard disk. Which method would secure this data from
unauthorized access?
• Data encryption
15) How can you keep your personal browsing history hidden from other users on a shared
computer?
• Authentication
• access control
• cryptography
• threats in cybersecurity
17) Can a worm act like a virus? If yes specify the main properties that can transform a worm code
18) Can you think of three reasons why something as intangible as information is considered a
sensitive corporate asset often valued even higher than physical assets?
19) Reflect on a cybersecurity policy with which you are familiar. The example can come from
work, school, or a business relationship. You can also research organizational policies posted
online. Give a brief description of the policy. What is the purpose and value of the policy?
20) If you forget your password for a website and you click [Forgot my password], sometimes the
company sends you a new password by email, but sometimes it sends you your old
password by email. Compare these two cases in terms of the vulnerability of the website
owner