Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Final Quiz
Due No due date Points 100 Questions 50 Time Limit 60 Minutes
Allowed Attempts 2
Instructions
This quiz covers all of the content in Cybersecurity Essentials 1.1. It is designed to test the skills and
knowledge presented in the course.
There are multiple task types that may be available in this quiz.
NOTE: Quizzes allow for partial credit scoring on all item types to foster learning. Points on quizzes can
also be deducted for answering incorrectly.
Forms 32901 - 23908
Attempt History
Attempt Time Score
LATEST Attempt 1 29 minutes 94.67 out of 100
Question 1 2 / 2 pts
Correct!
black hat hackers
https://82252856.netacad.com/courses/608007/quizzes/5337980 1/32
12/15/2019 Final Quiz: Cybersecurity Essentials - EN 0118
script kiddies
Question 2 2 / 2 pts
script kiddies
Question 3 2 / 2 pts
https://82252856.netacad.com/courses/608007/quizzes/5337980 2/32
12/15/2019 Final Quiz: Cybersecurity Essentials - EN 0118
Correct!
They are part of a protest group behind a political cause.
Question 4 2 / 2 pts
NIST/NICE framework
CIA Triad
Correct!
ISO/IEC 27000
Question 5 2 / 2 pts
https://82252856.netacad.com/courses/608007/quizzes/5337980 3/32
12/15/2019 Final Quiz: Cybersecurity Essentials - EN 0118
wired networks
sneaker net
virtual networks
Question 6 2 / 2 pts
Implement a VLAN.
Implement RAID.
https://82252856.netacad.com/courses/608007/quizzes/5337980 4/32
12/15/2019 Final Quiz: Cybersecurity Essentials - EN 0118
Question 7 2 / 2 pts
Correct! NAC
NAS
VPN
SAN
Question 8 2 / 2 pts
What are three states of data during which data is vulnerable? (Choose
three.)
data encrypted
https://82252856.netacad.com/courses/608007/quizzes/5337980 5/32
12/15/2019 Final Quiz: Cybersecurity Essentials - EN 0118
purged data
data decrypted
Question 9 2 / 2 pts
spamming
phishing
spoofing
Correct! sniffing
https://82252856.netacad.com/courses/608007/quizzes/5337980 6/32
12/15/2019 Final Quiz: Cybersecurity Essentials - EN 0118
Question 10 2 / 2 pts
Users report that the database on the main server cannot be accessed. A
database administrator verifies the issue and notices that the database file is
now encrypted. The organization receives a threatening email demanding
payment for the decryption of the database file. What type of attack has the
organization experienced?
man-in-the-middle attack
Trojan horse
DoS attack
Correct!
ransomeware
Question 11 2 / 2 pts
What are the two most effective ways to defend against malware? (Choose
two.)
Implement a VPN.
Implement RAID.
https://82252856.netacad.com/courses/608007/quizzes/5337980 7/32
12/15/2019 Final Quiz: Cybersecurity Essentials - EN 0118
Correct!
Install and update antivirus software.
Correct!
Update the operating system and other application software.
Question 12 2 / 2 pts
sniffing
man-in-the-middle
Correct!
spoofing
spamming
https://82252856.netacad.com/courses/608007/quizzes/5337980 8/32
12/15/2019 Final Quiz: Cybersecurity Essentials - EN 0118
What three best practices can help defend against social engineering
attacks? (Choose three.)
You Answered
Enable a policy that states that the IT department should supply information
over the phone only to managers.
Correct!
Do not provide password resets in a chat window.
Correct!
Resist the urge to click on enticing web links.
Question 14 2 / 2 pts
packet Injection
man-in-the-middle
SQL injection
https://82252856.netacad.com/courses/608007/quizzes/5337980 9/32
12/15/2019 Final Quiz: Cybersecurity Essentials - EN 0118
Correct! DoS
Question 15 0 / 2 pts
It is an impersonation attack.
It is a DDoS attack.
Question 16 2 / 2 pts
logical
Correct! administrative
physical
technological
Question 17 2 / 2 pts
Correct! logical
technological
physical
administrative
https://82252856.netacad.com/courses/608007/quizzes/5337980 11/32
12/15/2019 Final Quiz: Cybersecurity Essentials - EN 0118
Question 18 2 / 2 pts
Correct!
Block ciphers result in output data that is larger than the input data most of the
time.
Question 19 2 / 2 pts
Correct!
when the organization needs to look for prohibited activity
https://82252856.netacad.com/courses/608007/quizzes/5337980 12/32
12/15/2019 Final Quiz: Cybersecurity Essentials - EN 0118
Question 20 2 / 2 pts
Which algorithm will Windows use by default when a user intends to encrypt
files and folders in an NTFS volume?
RSA
3DES
Correct!
AES
DES
Question 21 0 / 2 pts
https://82252856.netacad.com/courses/608007/quizzes/5337980 13/32
12/15/2019 Final Quiz: Cybersecurity Essentials - EN 0118
Alice and Bob are using public key encryption to exchange a message.
Which key should Alice use to encrypt a message to Bob?
You Answered
the private key of Alice
Question 22 2 / 2 pts
Before data is sent out for analysis, which technique can be used to replace
sensitive data in nonproduction environments to protect the underlying
information?
steganography
software obfuscation
Correct!
data masking substitution
steganalysis
https://82252856.netacad.com/courses/608007/quizzes/5337980 14/32
12/15/2019 Final Quiz: Cybersecurity Essentials - EN 0118
Question 23 2 / 2 pts
A user has a large amount of data that needs to be kept confidential. Which
algorithm would best meet this requirement?
Correct!
3DES
RSA
ECC
Diffie-Hellman
Question 24 2 / 2 pts
What kind of integrity does a database have when all its rows have a unique
identifier called a primary key?
Correct!
entity integrity
referential integrity
https://82252856.netacad.com/courses/608007/quizzes/5337980 15/32
12/15/2019 Final Quiz: Cybersecurity Essentials - EN 0118
domain integrity
user-defined integrity
Question 25 2 / 2 pts
symmetrical encryption
Correct!
digital certificates
data hashing
asymmetrical encryption
Question 26 2 / 2 pts
https://82252856.netacad.com/courses/608007/quizzes/5337980 16/32
12/15/2019 Final Quiz: Cybersecurity Essentials - EN 0118
HMAC
Correct! salting
SHA-256
CRC
Question 27 2 / 2 pts
Alice and Bob are using a digital signature to sign a document. What key
should Alice use to sign the document so that Bob can make sure that the
document came from Alice?
https://82252856.netacad.com/courses/608007/quizzes/5337980 17/32
12/15/2019 Final Quiz: Cybersecurity Essentials - EN 0118
Question 28 2 / 2 pts
password digest
algorithm tables
Question 29 2 / 2 pts
https://82252856.netacad.com/courses/608007/quizzes/5337980 18/32
12/15/2019 Final Quiz: Cybersecurity Essentials - EN 0118
You have been asked to work with the data collection and entry staff in your
organization in order to improve data integrity during initial data entry and
data modification operations. Several staff members ask you to explain why
the new data entry screens limit the types and size of data able to be entered
in specific fields. What is an example of a new data integrity control?
Correct!
a validation rule which has been implemented to ensure completeness,
accuracy, and consistency of data
data entry controls which only allow entry staff to view current data
Question 30 2 / 2 pts
You have been asked to describe data validation to the data entry clerks in
accounts receivable. Which of the following are good examples of strings,
integers, and decimals?
Correct!
female, 9866, $125.50
https://82252856.netacad.com/courses/608007/quizzes/5337980 19/32
12/15/2019 Final Quiz: Cybersecurity Essentials - EN 0118
Question 31 2 / 2 pts
A VPN will be used within the organization to give remote users secure
access to the corporate network. What does IPsec use to authenticate the
origin of every packet to provide data integrity checking?
CRC
password
Correct!
HMAC
salting
Question 32 2 / 2 pts
What is it called when an organization only installs applications that meet its
guidelines, and administrators increase security by eliminating all other
applications?
https://82252856.netacad.com/courses/608007/quizzes/5337980 20/32
12/15/2019 Final Quiz: Cybersecurity Essentials - EN 0118
asset classification
asset identification
asset availability
Correct!
asset standardization
Question 33 2 / 2 pts
Correct!
containment and recovery
Correct!
detection and analysis
https://82252856.netacad.com/courses/608007/quizzes/5337980 21/32
12/15/2019 Final Quiz: Cybersecurity Essentials - EN 0118
Question 34 2 / 2 pts
uninterruptible services
fault tolerance
Correct!
system resiliency
Question 35 2 / 2 pts
diversity
https://82252856.netacad.com/courses/608007/quizzes/5337980 22/32
12/15/2019 Final Quiz: Cybersecurity Essentials - EN 0118
obscurity
Correct! layering
limiting
Question 36 2 / 2 pts
An organization has recently adopted a five nines program for two critical
database servers. What type of controls will this involve?
Question 37 2 / 2 pts
https://82252856.netacad.com/courses/608007/quizzes/5337980 23/32
12/15/2019 Final Quiz: Cybersecurity Essentials - EN 0118
asset standardization
asset availability
asset identification
Question 38 2 / 2 pts
NIST/NICE framework
Infragard
https://82252856.netacad.com/courses/608007/quizzes/5337980 24/32
12/15/2019 Final Quiz: Cybersecurity Essentials - EN 0118
Question 39 2 / 2 pts
qualitative analysis
protection analysis
loss analysis
Question 40 2 / 2 pts
Which two values are required to calculate annual loss expectancy? (Choose
two.)
https://82252856.netacad.com/courses/608007/quizzes/5337980 25/32
12/15/2019 Final Quiz: Cybersecurity Essentials - EN 0118
frequency factor
asset value
exposure factor
Question 41 2 / 2 pts
https://82252856.netacad.com/courses/608007/quizzes/5337980 26/32
12/15/2019 Final Quiz: Cybersecurity Essentials - EN 0118
Question 42 2 / 2 pts
WEP
WEP2
WPA
Correct! WPA2
Question 43 2 / 2 pts
Which protocol would be used to provide security for employees that access
systems remotely from home?
Telnet
SCP
WPA
Correct! SSH
https://82252856.netacad.com/courses/608007/quizzes/5337980 27/32
12/15/2019 Final Quiz: Cybersecurity Essentials - EN 0118
Question 44 2 / 2 pts
Question 45 2 / 2 pts
DNS
RIP
https://82252856.netacad.com/courses/608007/quizzes/5337980 28/32
12/15/2019 Final Quiz: Cybersecurity Essentials - EN 0118
NTP
Correct! ping
Question 46 2 / 2 pts
MS Baseliner
Question 47 2 / 2 pts
strong authentication
https://82252856.netacad.com/courses/608007/quizzes/5337980 29/32
12/15/2019 Final Quiz: Cybersecurity Essentials - EN 0118
ARP
SSH
Question 48 2 / 2 pts
packet analyzers
password crackers
packet sniffers
Question 49 2 / 2 pts
https://82252856.netacad.com/courses/608007/quizzes/5337980 30/32
12/15/2019 Final Quiz: Cybersecurity Essentials - EN 0118
Which threat is mitigated through user awareness training and tying security
awareness to performance reviews?
device-related threats
physical threats
cloud-related threats
Question 50 2 / 2 pts
CERT
https://82252856.netacad.com/courses/608007/quizzes/5337980 31/32
12/15/2019 Final Quiz: Cybersecurity Essentials - EN 0118
https://82252856.netacad.com/courses/608007/quizzes/5337980 32/32