A) Monitors and controls incoming and outgoing network traffic B) Takes photographs C) Measures temperature D) Records music
A) Typing really fast B) Verification method using two factors: something you know and something you have C) Using two different keyboards D) Writing two passwords
A) Malware that encrypts files and demands payment for decryption B) Software for word processing C) Software for data backup D) Software for photo editing
A) Using strong, unique passwords for each account B) Sharing passwords with friends C) Writing passwords on sticky notes D) Reusing the same password
A) To organize files B) To fix security vulnerabilities and bugs C) To enhance video streaming quality D) To change desktop backgrounds
A) Secure online communication by encrypting data transmitted between a website and a user B) Creating music playlists C) Repairing electronic devices D) Sorting documents alphabetically
A) Analyzing weather patterns B) Finding job opportunities C) Planning vacations D) Process of identifying security weaknesses in a system
A) Security flaw that is unknown to the software vendor B) Countdown to launch new products C) Software that has zero bugs D) Technical support available 24/7
A) Cybersecurity B) Network security C) Physical security D) Biometric security
A) Hardware upgrades and software updates B) User interface design flaws C) Unauthorized information disclosure, theft, or damage D) Network speed optimization
A) A vulnerability without any known exploits B) A vulnerability that enhances security C) A vulnerability with at least one working attack or exploit D) A vulnerability that cannot be discovered
A) Normal internet users B) Cybersecurity experts exclusively C) Government agencies only D) Only large corporations
A) WiFi SSID spoofing B) IP address spoofing C) Message spoofing D) DNS spoofing
A) 2020 B) 2017 C) 1999 D) 2005
A) Email spoofing B) Text message C) Instant messaging D) Phone call
A) Spear-phishing B) Vertical escalation C) Horizontal escalation D) Generic phishing
A) Sending ransomware to large networks B) Social engineering techniques, often phishing C) Direct hacking of system hardware D) Exploiting side-channel vulnerabilities
A) Leveraging hardware implementation faults B) Phishing via text message C) Analyzing residual effects on RAM cells D) Exploiting electromagnetic radiation from devices
A) Phishing B) Vertical escalation C) Horizontal escalation D) Spear-phishing
A) SQL injection attacks. B) Cross-site scripting attacks. C) Distributed denial-of-service attacks. D) Evil Maid attacks.
A) 30% B) 70% C) 50% D) 10%
A) Pre-evaluation B) Operative planning C) Strategic planning D) Post-evaluation
A) Five sections. B) Seven sections. C) Ten sections. D) Three sections.
A) Maximum impact to test defenses. B) Unlimited access for attackers. C) Minimal severity. D) Severe enough to cause major disruptions.
A) Graphic design software. B) Data analysis tools. C) Firewalls. D) Word processing applications.
A) Triple DES B) Advanced Encryption Standard (AES) C) RSA D) Data Encryption Standard (DES)
A) Mobile-enabled access B) Drive locks C) Intrusion detection systems D) Cryptographic capabilities
A) Drive locks B) Infected USB dongles connected inside a firewall C) Mobile-enabled access devices D) Trusted Platform Modules
A) Drive locks B) USB dongles C) TPMs D) IOMMUs
A) TPMs B) IOMMUs C) Drive locks D) Thumbprint readers
A) ISO 9001 B) Six Sigma C) Lean Manufacturing D) Common Criteria (CC)
A) Role-based access control (RBAC) B) Access control lists (ACLs) C) Mandatory access control (MAC) D) Capability-based security
A) The language level B) The user interface level C) The hardware level D) The network level
A) The E language B) Java C) Python D) C++
A) About 70% B) Exactly 100% C) More than 90% D) Less than 50%
A) Dietary habits B) Personal hygiene C) Physical fitness D) Sleep patterns
A) Tim Berners-Lee B) Steve Jobs C) Vint Cerf D) Bill Gates
A) Virtual private networks (VPNs) B) Biometric authentication systems C) Chip Authentication Program D) Two-factor authentication via SMS
A) Instant Issuance technology B) Blockchain-based transactions C) Contactless payment systems D) QR code scanning
A) The Computer Emergency Readiness Team B) The Central Intelligence Agency (CIA) C) The Federal Bureau of Investigation (FBI) D) The National Security Agency (NSA)
A) It can cause worldwide repercussions B) It has no significant impact C) It improves airport efficiency D) It only affects the local area
A) Manual ticket sales B) E-ticketing transactions C) Barter systems D) Paper tickets
A) 75% B) 62% C) 80% D) 50%
A) Smartphones and tablets B) Desktop computers C) Healthcare providers' networks D) Home automation devices like the Nest thermostat
A) Nest B) Sony Pictures C) HBGary Federal D) Home Depot
A) Cruise control system B) Airbag deployment C) A malicious compact disc D) Bluetooth communication
A) 5 miles away B) 10 miles away C) 20 miles away D) 15 miles away
A) FedEx B) Tesla C) UPS D) ICV
A) GPS B) RFID (Radio Frequency Identification) C) Bluetooth D) Barcodes
A) Monterrey B) Guadalajara C) Mexico City D) Puebla
A) 1 January 2017 B) 15 November 2015 C) 30 June 2018 D) 28 December 2016
A) Medical training simulators B) Hospital cafeteria systems C) In-hospital diagnostic equipment D) Patient transport vehicles
A) An analog radio. B) The SIM (Subscriber Identity Module) card. C) A landline telephone. D) A smartwatch.
A) Clifford Stoll B) Markus Hess C) An internet activist D) A Ukrainian power grid operator
A) The Cuckoo's Egg B) Ghost in the Wires C) Cybersecurity and Cyberwar: What Everyone Needs to Know D) Data and Goliath
A) A bank data breach in 2021 B) A ransomware attack on healthcare facilities C) An attack on a social media platform D) The 2015 Ukraine power grid hack
A) Preparation B) Detection and analysis C) Containment, eradication and recovery D) Post incident activity
A) John McAfee B) Robert Tappan Morris C) Kevin Mitnick D) Adrian Lamo
A) 2000 B) 1994 C) 2010 D) 1988
A) SQL injection B) Trojan horses C) Brute force attacks D) Phishing emails
A) TJX B) Office of Personnel Management C) Home Depot D) Target Corporation
A) U.S. military systems B) European power grids C) Iran's nuclear centrifuges D) Israeli government networks
A) Edward Snowden B) Julian Assange C) Mark Zuckerberg D) Chelsea Manning
A) NotPetya B) Rescator C) Lazarus Group D) Guccifer
A) 10 million B) 60 million C) Roughly 40 million D) 25 million
A) They shut down their systems temporarily B) They immediately fixed all vulnerabilities C) They upgraded their security software D) Warnings were ignored
A) Chinese hackers B) North Korean hackers C) Russian hackers D) Iranian hackers
A) Ashley Madison B) Facebook C) LinkedIn D) Twitter
A) He denied any wrongdoing B) He took legal action against The Impact Team C) He resigned D) He increased security measures
A) Coordinating global CSIRTs. B) Securing government systems. C) Managing European network security. D) Regulating international data protection laws.
A) Forum of Incident Response and Security Teams (FIRST) B) Council of Europe C) European Network and Information Security Agency (ENISA) D) Canadian Cyber Incident Response Centre (CCIRC)
A) STOP.THINK.CONNECT B) Canadian Cyber Incident Response Centre (CCIRC) C) Council of Europe D) European Network and Information Security Agency (ENISA)
A) Indian Computer Emergency Response Team B) Ministry of Electronics and Information Technology C) National Cyber Security Agency D) CERT-In
A) 2013 B) 2020 C) 1999 D) 2008
A) National White Collar Crime Center (NW3C) B) Federal Communications Commission C) Cybersecurity and Infrastructure Security Agency D) Department of Homeland Security
A) CERT/CC B) US-CERT C) NEI D) NRC
A) 2015 B) 2008 C) 2010 D) 2009
A) 28% B) 35% C) 46% D) 50%
A) Port scanning. B) Passwords. C) Smart cards. D) Biometric systems.
A) Finding who perpetrated a cyberattack. B) Detecting and eliminating malware. C) Encrypting data for secure transmission. D) Logging user activity on a network.
A) 1980s B) 1970s C) 1990s D) 2000s
A) Willis Ware B) Bob Thomas C) Markus Hess D) Ray Tomlinson
A) Reaper B) Morris worm C) Blaster D) Creeper
A) Ray Tomlinson B) Willis Ware C) Bob Thomas D) Markus Hess
A) IBM B) Microsoft C) Netscape D) Apple |