Assignment

Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

1

Name
Outlook Email;
Highlight the answers in Yellow
1) Which of the following firewalls hides or masquerades the private addresses of network
hosts?
• Reverse proxy firewall

• Host-based firewall

• Proxy server

• Network address translation firewall

• Network layer firewall

2) Carrying out a multi-phase, long-term, stealthy and advanced operation against a specific

target is often referred to as what?

• Advanced persistent threat

• Network sniffing

• Social engineering

• Script kiddies

• Rainbow tables

3) You are configuring access settings to require employees in your organization to authenticate

first before accessing certain web pages. Which requirement of information security is

addressed through this configuration?

• Scalability

• Availability

• Integrity

• Confidentiality
2

4) An organization is experiencing overwhelming visits to a main web server. You are developing

a plan to add a couple of more web servers for load balancing and redundancy. Which

requirement of information security is addressed by implementing the plan?

• Scalability

• Integrity

• Confidentiality

• Availability

5) What of the following are examples of cracking an encrypted password? (Choose four correct

answers)

• Intimidation

• Brute force attack

• Network sniffing

• Rainbow tables

• Social engineering

• Spraying

• Dictionary attack

6) Improper management of physical access to a resource, such as a file, can lead to what type of

security vulnerability?

• Weaknesses in security practices

• Race conditions

• Access control problems

• Buffer overflow

• Non-validated input
3

7) A medical office employee sends emails to patients about their recent visits to the facility.

What information would put the privacy of the patients at risk if it was included in the email?

• Contact information

• Next appointment

• Patient records

• First and last name

8) You are surfing the Internet using a laptop at a public Wi-Fi cafe. What should you check first

before you connect to the public network?

9) Which technology creates a security token that allows a user to log in to a desired web

application using credentials from a social media website?

• Open authorization

• VPN service

• Password manager

• In-private browsing mode

10) Which of the following firewalls filters traffic based on source and destination IP addresses?

• Network layer firewall

• Proxy server

• Application layer firewall

• Transport layer firewall

• Network address translation firewall

11) Which of the following firewalls filters web content requests such as URLs and domain names?

• Application layer firewall

• Proxy server

• Reverse proxy server


4

• Network layer firewall

• Network address translation firewall

12) Which of the following items are states of data? (Choose three correct answers)

• Storage

• Text

• ASCII

• Transmission

• Binary

• Processing

13) What action will an IDS take upon detection of malicious traffic?

• Block or deny all traffic

• Create a network alert and log the detection

• Drop only packets identified as malicious

• Reroute malicious traffic to a honeypot

14) You have stored your data on a local hard disk. Which method would secure this data from

unauthorized access?

• Data encryption

• Two factor authentication

• Duplication of the hard drive

• Deletion of sensitive files

15) How can you keep your personal browsing history hidden from other users on a shared

computer?

• Use only an encrypted connection to access websites

• Operate the web browser in private browser mode


5

• Move any downloaded files to the recycle bin

• Reboot the computer after closing the web browser

16) Explain the following terms;

• Authentication

• access control

• cryptography

• threats in cybersecurity

• ways to mitigate risks in cybersecurity

17) Can a worm act like a virus? If yes specify the main properties that can transform a worm code

to a virus code. Justify your answer.

18) Can you think of three reasons why something as intangible as information is considered a

sensitive corporate asset often valued even higher than physical assets?

19) Reflect on a cybersecurity policy with which you are familiar. The example can come from

work, school, or a business relationship. You can also research organizational policies posted

online. Give a brief description of the policy. What is the purpose and value of the policy?

20) If you forget your password for a website and you click [Forgot my password], sometimes the

company sends you a new password by email, but sometimes it sends you your old

password by email. Compare these two cases in terms of the vulnerability of the website

owner

You might also like