• Register
2,500 points
9 2

1. Why would a hacker use a proxy server?

A. To create a stronger connection with the target.
B. To create a ghost server on the network.
C. To obtain a remote access connection.
D. To hide malicious activity on the network.

Answer: D

2. Cybersecurity encompass the full range of?

A. vulnerability reduction
B. incident response
C. recovery policies
D. All of the above

Answer: D

3. Cybersecurity is the protection of ?

A. Internet connected systems
B. Non-Internet connected systems
C. Both A and B
D. None of the above

Answer: A

4. What type of attack uses a fraudulent server with a relay address?


Answer: B

5. What is true about cybersecurity?

A. cybersecurity as the set of principles and practices designed to protect our computing resources
B. cybersecurity as the set of principles and practices designed to protect our online information against threats
C. cybersecurity is a critical function and needed insurance of many businesses.
D. All of the above

Answer: D

6. To hide information inside a picture, what technology is used?

A. Rootkits
B. Bitmapping
C. Steganography
D. Image Rendering

Answer: C

7. What was the name of program Robert Thomas created?

A. Virus
B. Thomas program
C. Creeper

Answer : C

8. What was the name of first antivirus software?

A. ray Tomlinson
B. tinkered
C. reaper
D. repair

Answer : C

9. In which year, Moris worm virus named?

A. 1988
B. 1989
C. 1990
D. 1991

Answer : A

10. Which of the following is one of the Cyber Security Goals?

A. Protect the confidentiality of data.
B. Preserve the integrity of data
C. Promote the availability of data for authorized users
D. All of the above

Answer : D

11. Cybersecurity is primarily about ?

A. people
B. processes
C. technologies
D. All of the above

Answer: D

12. What type of symmetric key algorithm using a streaming cipher to encrypt information?

A. RC4
B. Blowfish
D. MD5

Answer: A

13. Which of the following is not a factor in securing the environment against an attack on security?

A. The education of the attacker
B. The system configuration
C. The network architecture
D. The business strategy of the company
E. The level of access provided to employees

Answer: D

14. Cybersecurity also be referred to as?

A. incident security
B. information technology security
C. internet security
D. threat security

Answer: B

15. What port is used to connect to the Active Directory in Windows 2000?

A. 80
B. 445
C. 139
D. 389

Answer : D

16. In which year, the first computer worm (virus) created?

A. 1969
B. 1970
C. 1971
D. 1972

Answer: B

17. Which phase of hacking performs actual attack on a network or system?

A. Reconnaissance
B. Maintaining Access
C. Scanning
D. Gaining Access

Answer: D

18. Attempting to gain access to a network using an employee’s credentials is called the _____________ mode of ethical hacking.

A. Local networking
B. Social engineering
C. Physical entry
D. Remote networking

Answer: A

19. Which Federal Code applies the consequences of hacking activities that disrupt subway transit systems?

A. Electronic Communications Interception of Oral Communications
B. 18 U.S.C. § 1029
C. Cyber Security Enhancement Act 2002
D. 18 U.S.C. § 1030

Answer: C

20. Which of the following is not a typical characteristic of an ethical hacker?

A. Excellent knowledge of Windows.
B. Understands the process of exploiting network vulnerabilities.
C. Patience, persistence and perseverance.
D. Has the highest level of security for the organization.

Answer: D




2,500 points
9 2