Professional Documents
Culture Documents
Final Quiz
Due No due date Points 100 Questions 50 Time Limit 60 Minutes
Allowed Attempts 2
Instruc ons
This quiz covers all of the content in Cybersecurity Essentials 1.1. It is designed to test the skills and
knowledge presented in the course.
There are multiple task types that may be available in this quiz.
NOTE: Quizzes allow for partial credit scoring on all item types to foster learning. Points on quizzes can
also be deducted for answering incorrectly.
A empt History
Attempt Time Score
LATEST Attempt 1 24 minutes 98 out of 100
Question 1 2 / 2 pts
Correct!
They are part of a protest group behind a political cause.
https://210561797.netacad.com/courses/743376/quizzes/6673458 1/28
10/2/2019 Final Quiz: UI-CYBERSECURITYESSEN-CV-9NO-SIS-2018-2019
Question 2 2 / 2 pts
Correct!
Honeynet project
CVE database
Infragard
Question 3 2 / 2 pts
Which two groups of people are considered internal attackers? (Choose two.)
Correct!
ex-employees
Correct!
trusted partners
amateurs
hacktivists
https://210561797.netacad.com/courses/743376/quizzes/6673458 2/28
10/2/2019 Final Quiz: UI-CYBERSECURITYESSEN-CV-9NO-SIS-2018-2019
Question 4 2 / 2 pts
data in-transit
Correct!
stored data
encrypted data
data in-process
Question 5 2 / 2 pts
hashing
identity management
RAID
Correct!
encryption
https://210561797.netacad.com/courses/743376/quizzes/6673458 3/28
10/2/2019 Final Quiz: UI-CYBERSECURITYESSEN-CV-9NO-SIS-2018-2019
Question 6 2 / 2 pts
SAN
VPN
NAS
Correct!
NAC
Question 7 2 / 2 pts
Correct!
a smart card reader
SHA-1 hash
a virtual fingerprint
a Mantrap
https://210561797.netacad.com/courses/743376/quizzes/6673458 4/28
10/2/2019 Final Quiz: UI-CYBERSECURITYESSEN-CV-9NO-SIS-2018-2019
Question 8 2 / 2 pts
What are three states of data during which data is vulnerable? (Choose
three.)
data encrypted
Correct!
data in-transit
purged data
Correct!
stored data
Correct!
data in-process
data decrypted
Question 9 2 / 2 pts
man-in-the-middle
https://210561797.netacad.com/courses/743376/quizzes/6673458 5/28
10/2/2019 Final Quiz: UI-CYBERSECURITYESSEN-CV-9NO-SIS-2018-2019
spamming
sniffing
Correct!
spoofing
Question 10 2 / 2 pts
What three best practices can help defend against social engineering
attacks? (Choose three.)
Correct!
Educate employees regarding policies.
Correct!
Resist the urge to click on enticing web links.
Enable a policy that states that the IT department should supply information
over the phone only to managers.
Correct!
Do not provide password resets in a chat window.
https://210561797.netacad.com/courses/743376/quizzes/6673458 6/28
10/2/2019 Final Quiz: UI-CYBERSECURITYESSEN-CV-9NO-SIS-2018-2019
Question 11 2 / 2 pts
phishing
spoofing
Correct! sniffing
spamming
Question 12 2 / 2 pts
It is an impersonation attack.
It is a DDoS attack.
Correct! It is a hoax.
It is a piggy-back attack.
https://210561797.netacad.com/courses/743376/quizzes/6673458 7/28
10/2/2019 Final Quiz: UI-CYBERSECURITYESSEN-CV-9NO-SIS-2018-2019
Question 13 2 / 2 pts
trusted partners
Correct! intimidation
urgency
familiarity
Question 14 2 / 2 pts
What type of application attack occurs when data goes beyond the memory
areas allocated to the application?
RAM spoofing
RAM Injection
SQL injection
https://210561797.netacad.com/courses/743376/quizzes/6673458 8/28
10/2/2019 Final Quiz: UI-CYBERSECURITYESSEN-CV-9NO-SIS-2018-2019
Question 15 2 / 2 pts
Users report that the network access is slow. After questioning the
employees, the network administrator learned that one employee
downloaded a third-party scanning program for the printer. What type of
malware might be introduced that causes slow performance of the network?
virus
spam
phishing
Correct! worm
Question 16 2 / 2 pts
authorization
access
Correct! authentication
https://210561797.netacad.com/courses/743376/quizzes/6673458 9/28
10/2/2019 Final Quiz: UI-CYBERSECURITYESSEN-CV-9NO-SIS-2018-2019
identification
Question 17 2 / 2 pts
Correct! logical
physical
administrative
technological
Question 18 2 / 2 pts
A user has a large amount of data that needs to be kept confidential. Which
algorithm would best meet this requirement?
Correct! 3DES
ECC
https://210561797.netacad.com/courses/743376/quizzes/6673458 10/28
10/2/2019 Final Quiz: UI-CYBERSECURITYESSEN-CV-9NO-SIS-2018-2019
RSA
Diffie-Hellman
Question 19 2 / 2 pts
compensative control
detective control
deterrent control
Question 20 2 / 2 pts
ACL
https://210561797.netacad.com/courses/743376/quizzes/6673458 11/28
10/2/2019 Final Quiz: UI-CYBERSECURITYESSEN-CV-9NO-SIS-2018-2019
MAC
RBAC
Correct! DAC
Question 21 2 / 2 pts
Which access control should the IT department use to restore a system back
to its normal state?
preventive
Correct! corrective
detective
compensative
Question 22 2 / 2 pts
https://210561797.netacad.com/courses/743376/quizzes/6673458 12/28
10/2/2019 Final Quiz: UI-CYBERSECURITYESSEN-CV-9NO-SIS-2018-2019
Question 23 2 / 2 pts
Which algorithm will Windows use by default when a user intends to encrypt
files and folders in an NTFS volume?
Correct! AES
DES
RSA
3DES
Question 24 2 / 2 pts
https://210561797.netacad.com/courses/743376/quizzes/6673458 13/28
10/2/2019 Final Quiz: UI-CYBERSECURITYESSEN-CV-9NO-SIS-2018-2019
algorithm tables
password digest
Question 25 2 / 2 pts
What kind of integrity does a database have when all its rows have a unique
identifier called a primary key?
referential integrity
domain integrity
user-defined integrity
https://210561797.netacad.com/courses/743376/quizzes/6673458 14/28
10/2/2019 Final Quiz: UI-CYBERSECURITYESSEN-CV-9NO-SIS-2018-2019
Question 26 2 / 2 pts
SHA-256
HMAC
CRC
Correct! salting
Question 27 2 / 2 pts
A VPN will be used within the organization to give remote users secure
access to the corporate network. What does IPsec use to authenticate the
origin of every packet to provide data integrity checking?
salting
CRC
password
https://210561797.netacad.com/courses/743376/quizzes/6673458 15/28
10/2/2019 Final Quiz: UI-CYBERSECURITYESSEN-CV-9NO-SIS-2018-2019
Correct! HMAC
Question 28 2 / 2 pts
AES
Correct! HMAC
salting
MD5
Question 29 2 / 2 pts
digital signature
asymmetric encryption
https://210561797.netacad.com/courses/743376/quizzes/6673458 16/28
10/2/2019 Final Quiz: UI-CYBERSECURITYESSEN-CV-9NO-SIS-2018-2019
salting
Question 30 2 / 2 pts
3DES
MD5
Correct! SHA-256
AES-256
Question 31 2 / 2 pts
You have been asked to describe data validation to the data entry clerks in
accounts receivable. Which of the following are good examples of strings,
integers, and decimals?
https://210561797.netacad.com/courses/743376/quizzes/6673458 17/28
10/2/2019 Final Quiz: UI-CYBERSECURITYESSEN-CV-9NO-SIS-2018-2019
Question 32 2 / 2 pts
There are many environments that require five nines, but a five nines
environment may be cost prohibitive. What is one example of where the five
nines environment might be cost prohibitive?
Question 33 2 / 2 pts
An organization has recently adopted a five nines program for two critical
database servers. What type of controls will this involve?
https://210561797.netacad.com/courses/743376/quizzes/6673458 18/28
10/2/2019 Final Quiz: UI-CYBERSECURITYESSEN-CV-9NO-SIS-2018-2019
Question 34 2 / 2 pts
Which technology would you implement to provide high availability for data
storage?
N+1
Correct! RAID
hot standby
software updates
Question 35 0 / 2 pts
https://210561797.netacad.com/courses/743376/quizzes/6673458 19/28
10/2/2019 Final Quiz: UI-CYBERSECURITYESSEN-CV-9NO-SIS-2018-2019
loss analysis
protection analysis
Question 36 2 / 2 pts
Correct! transfer
acceptance
reduction
avoidance
https://210561797.netacad.com/courses/743376/quizzes/6673458 20/28
10/2/2019 Final Quiz: UI-CYBERSECURITYESSEN-CV-9NO-SIS-2018-2019
Question 37 2 / 2 pts
NIST/NICE framework
Infragard
Question 38 2 / 2 pts
asset identification
asset availability
asset standardization
https://210561797.netacad.com/courses/743376/quizzes/6673458 21/28
10/2/2019 Final Quiz: UI-CYBERSECURITYESSEN-CV-9NO-SIS-2018-2019
Question 39 2 / 2 pts
Correct!
layering
diversity
obscurity
limiting
Question 40 2 / 2 pts
Which two values are required to calculate annual loss expectancy? (Choose
two.)
exposure factor
Correct!
single loss expectancy
Correct!
annual rate of occurrence
frequency factor
asset value
https://210561797.netacad.com/courses/743376/quizzes/6673458 22/28
10/2/2019 Final Quiz: UI-CYBERSECURITYESSEN-CV-9NO-SIS-2018-2019
Question 41 2 / 2 pts
Correct!
WPA2
TKIP
Correct!
WPA
802.11q
Correct!
802.11i
WEP
Question 42 2 / 2 pts
Correct!
It deters casual trespassers only.
https://210561797.netacad.com/courses/743376/quizzes/6673458 23/28
10/2/2019 Final Quiz: UI-CYBERSECURITYESSEN-CV-9NO-SIS-2018-2019
Question 43 2 / 2 pts
Correct!
rate of false negatives and rate of false positives
Question 44 2 / 2 pts
ARP
https://210561797.netacad.com/courses/743376/quizzes/6673458 24/28
10/2/2019 Final Quiz: UI-CYBERSECURITYESSEN-CV-9NO-SIS-2018-2019
SSH
Correct!
encrypted voice messages
strong authentication
Question 45 2 / 2 pts
Correct!
ping
RIP
NTP
DNS
Question 46 2 / 2 pts
WEP
Correct!
WPA2
https://210561797.netacad.com/courses/743376/quizzes/6673458 25/28
10/2/2019 Final Quiz: UI-CYBERSECURITYESSEN-CV-9NO-SIS-2018-2019
WEP2
WPA
Question 47 2 / 2 pts
Correct!
STP
IP
RIP
WPA2
Correct!
ARP
ICMP
Question 48 2 / 2 pts
HVAC, water system, and fire systems fall under which of the cybersecurity
domains?
https://210561797.netacad.com/courses/743376/quizzes/6673458 26/28
10/2/2019 Final Quiz: UI-CYBERSECURITYESSEN-CV-9NO-SIS-2018-2019
device
user
Correct!
physical facilities
network
Question 49 2 / 2 pts
CERT
Correct!
The National Vulnerability Database website
Question 50 2 / 2 pts
https://210561797.netacad.com/courses/743376/quizzes/6673458 27/28
10/2/2019 Final Quiz: UI-CYBERSECURITYESSEN-CV-9NO-SIS-2018-2019
ISO/IEC 27000
Correct!
NIST Framework
https://210561797.netacad.com/courses/743376/quizzes/6673458 28/28