A) Takes photographs B) Measures temperature C) Records music D) Monitors and controls incoming and outgoing network traffic
A) Typing really fast B) Verification method using two factors: something you know and something you have C) Writing two passwords D) Using two different keyboards
A) Software for photo editing B) Software for data backup C) Malware that encrypts files and demands payment for decryption D) Software for word processing
A) Using strong, unique passwords for each account B) Reusing the same password C) Writing passwords on sticky notes D) Sharing passwords with friends
A) To organize files B) To change desktop backgrounds C) To enhance video streaming quality D) To fix security vulnerabilities and bugs
A) Creating music playlists B) Repairing electronic devices C) Secure online communication by encrypting data transmitted between a website and a user D) Sorting documents alphabetically
A) Finding job opportunities B) Process of identifying security weaknesses in a system C) Planning vacations D) Analyzing weather patterns
A) Security flaw that is unknown to the software vendor B) Software that has zero bugs C) Technical support available 24/7 D) Countdown to launch new products
A) Cybersecurity B) Biometric security C) Physical security D) Network security
A) Hardware upgrades and software updates B) User interface design flaws C) Unauthorized information disclosure, theft, or damage D) Network speed optimization
A) A vulnerability that enhances security B) A vulnerability with at least one working attack or exploit C) A vulnerability that cannot be discovered D) A vulnerability without any known exploits
A) Normal internet users B) Only large corporations C) Government agencies only D) Cybersecurity experts exclusively
A) IP address spoofing B) WiFi SSID spoofing C) Message spoofing D) DNS spoofing
A) 1999 B) 2017 C) 2005 D) 2020
A) Email spoofing B) Phone call C) Instant messaging D) Text message
A) Generic phishing B) Vertical escalation C) Spear-phishing D) Horizontal escalation
A) Direct hacking of system hardware B) Exploiting side-channel vulnerabilities C) Sending ransomware to large networks D) Social engineering techniques, often phishing
A) Phishing via text message B) Exploiting electromagnetic radiation from devices C) Analyzing residual effects on RAM cells D) Leveraging hardware implementation faults
A) Horizontal escalation B) Spear-phishing C) Vertical escalation D) Phishing
A) Evil Maid attacks. B) Cross-site scripting attacks. C) Distributed denial-of-service attacks. D) SQL injection attacks.
A) 10% B) 30% C) 70% D) 50%
A) Pre-evaluation B) Strategic planning C) Operative planning D) Post-evaluation
A) Five sections. B) Seven sections. C) Three sections. D) Ten sections.
A) Minimal severity. B) Severe enough to cause major disruptions. C) Maximum impact to test defenses. D) Unlimited access for attackers.
A) Word processing applications. B) Data analysis tools. C) Graphic design software. D) Firewalls.
A) RSA B) Advanced Encryption Standard (AES) C) Data Encryption Standard (DES) D) Triple DES
A) Cryptographic capabilities B) Mobile-enabled access C) Drive locks D) Intrusion detection systems
A) Trusted Platform Modules B) Infected USB dongles connected inside a firewall C) Mobile-enabled access devices D) Drive locks
A) Drive locks B) USB dongles C) IOMMUs D) TPMs
A) Drive locks B) TPMs C) IOMMUs D) Thumbprint readers
A) Common Criteria (CC) B) ISO 9001 C) Lean Manufacturing D) Six Sigma
A) Capability-based security B) Mandatory access control (MAC) C) Access control lists (ACLs) D) Role-based access control (RBAC)
A) The language level B) The user interface level C) The hardware level D) The network level
A) C++ B) Python C) The E language D) Java
A) About 70% B) Less than 50% C) Exactly 100% D) More than 90%
A) Sleep patterns B) Physical fitness C) Personal hygiene D) Dietary habits
A) Bill Gates B) Steve Jobs C) Tim Berners-Lee D) Vint Cerf
A) Virtual private networks (VPNs) B) Biometric authentication systems C) Chip Authentication Program D) Two-factor authentication via SMS
A) QR code scanning B) Blockchain-based transactions C) Contactless payment systems D) Instant Issuance technology
A) The Central Intelligence Agency (CIA) B) The Computer Emergency Readiness Team C) The Federal Bureau of Investigation (FBI) D) The National Security Agency (NSA)
A) It only affects the local area B) It has no significant impact C) It improves airport efficiency D) It can cause worldwide repercussions
A) E-ticketing transactions B) Barter systems C) Manual ticket sales D) Paper tickets
A) 75% B) 80% C) 62% D) 50%
A) Desktop computers B) Home automation devices like the Nest thermostat C) Healthcare providers' networks D) Smartphones and tablets
A) Sony Pictures B) Nest C) HBGary Federal D) Home Depot
A) A malicious compact disc B) Cruise control system C) Bluetooth communication D) Airbag deployment
A) 10 miles away B) 15 miles away C) 20 miles away D) 5 miles away
A) FedEx B) ICV C) UPS D) Tesla
A) GPS B) Barcodes C) RFID (Radio Frequency Identification) D) Bluetooth
A) Mexico City B) Puebla C) Monterrey D) Guadalajara
A) 28 December 2016 B) 15 November 2015 C) 1 January 2017 D) 30 June 2018
A) Medical training simulators B) Hospital cafeteria systems C) In-hospital diagnostic equipment D) Patient transport vehicles
A) The SIM (Subscriber Identity Module) card. B) An analog radio. C) A landline telephone. D) A smartwatch.
A) Markus Hess B) Clifford Stoll C) A Ukrainian power grid operator D) An internet activist
A) Cybersecurity and Cyberwar: What Everyone Needs to Know B) Ghost in the Wires C) The Cuckoo's Egg D) Data and Goliath
A) An attack on a social media platform B) A ransomware attack on healthcare facilities C) A bank data breach in 2021 D) The 2015 Ukraine power grid hack
A) Preparation B) Detection and analysis C) Containment, eradication and recovery D) Post incident activity
A) John McAfee B) Robert Tappan Morris C) Kevin Mitnick D) Adrian Lamo
A) 2010 B) 1988 C) 2000 D) 1994
A) Phishing emails B) Trojan horses C) Brute force attacks D) SQL injection
A) Home Depot B) TJX C) Target Corporation D) Office of Personnel Management
A) Israeli government networks B) U.S. military systems C) Iran's nuclear centrifuges D) European power grids
A) Mark Zuckerberg B) Edward Snowden C) Chelsea Manning D) Julian Assange
A) Rescator B) Lazarus Group C) Guccifer D) NotPetya
A) 25 million B) 60 million C) Roughly 40 million D) 10 million
A) They shut down their systems temporarily B) Warnings were ignored C) They immediately fixed all vulnerabilities D) They upgraded their security software
A) Russian hackers B) Iranian hackers C) Chinese hackers D) North Korean hackers
A) LinkedIn B) Ashley Madison C) Facebook D) Twitter
A) He increased security measures B) He took legal action against The Impact Team C) He resigned D) He denied any wrongdoing
A) Coordinating global CSIRTs. B) Managing European network security. C) Regulating international data protection laws. D) Securing government systems.
A) Forum of Incident Response and Security Teams (FIRST) B) European Network and Information Security Agency (ENISA) C) Canadian Cyber Incident Response Centre (CCIRC) D) Council of Europe
A) STOP.THINK.CONNECT B) European Network and Information Security Agency (ENISA) C) Canadian Cyber Incident Response Centre (CCIRC) D) Council of Europe
A) Ministry of Electronics and Information Technology B) Indian Computer Emergency Response Team C) CERT-In D) National Cyber Security Agency
A) 2008 B) 2020 C) 1999 D) 2013
A) National White Collar Crime Center (NW3C) B) Federal Communications Commission C) Department of Homeland Security D) Cybersecurity and Infrastructure Security Agency
A) NRC B) US-CERT C) CERT/CC D) NEI
A) 2009 B) 2010 C) 2008 D) 2015
A) 35% B) 28% C) 50% D) 46%
A) Passwords. B) Biometric systems. C) Port scanning. D) Smart cards.
A) Finding who perpetrated a cyberattack. B) Logging user activity on a network. C) Detecting and eliminating malware. D) Encrypting data for secure transmission.
A) 2000s B) 1970s C) 1990s D) 1980s
A) Bob Thomas B) Ray Tomlinson C) Willis Ware D) Markus Hess
A) Morris worm B) Creeper C) Reaper D) Blaster
A) Bob Thomas B) Markus Hess C) Ray Tomlinson D) Willis Ware
A) Apple B) Microsoft C) Netscape D) IBM |