Monday, August 23, 2021

cisco Cybersecurity Essentials Quiz 8 answer in bold


Question 1

Correct
Mark 2.00 out of 2.00
Flag question

Question text

A company has had several incidents involving users downloading unauthorized software, using unauthorized websites, and using personal USB devices. The CIO wants to put in place a scheme to manage the user threats. What three things might be put in place to manage the threats? (Choose three.)
Select one or more:
Use content filtering.
Monitor all activity by the users.
Change to thin clients.
Provide security awareness training.
Disable CD and USB access.
Implement disciplinary action.

Feedback

Question 2

Correct
Mark 2.00 out of 2.00
Flag question

Question text

If a person knowingly accesses a government computer without permission, what federal act laws would the person be subject to?
Select one:
SOX
GLBA
CFAA
ECPA

Feedback

Question 3

Correct
Mark 2.00 out of 2.00
Flag question

Question text

An organization has implemented a private cloud infrastructure. The security administrator is asked to secure the infrastructure from potential threats. What three tactics can be implemented to protect the private cloud? (Choose three.)
Select one or more:
Update devices with security fixes and patches.
Hire a consultant.
Grant administrative rights.
Disable ping, probing, and port scanning.
Test inbound and outbound traffic.
Disable firewalls.

Feedback

Question 4

Correct
Mark 2.00 out of 2.00
Flag question

Question text

What are two items that can be found on the Internet Storm Center website? (Choose two.)
Select one or more:
historical information
current laws
InfoSec job postings
InfoSec reports

Feedback

Question 5

Correct
Mark 2.00 out of 2.00
Flag question

Question text

What are two potential threats to applications? (Choose two.)
Select one or more:
data loss
unauthorized access
power interruptions
social engineering

Feedback

Question 6

Correct
Mark 2.00 out of 2.00
Flag question

Question text

A company is attempting to lower the cost in deploying commercial software and is considering a cloud based service. Which cloud based service would be best to host the software?
Select one:
RaaS
SaaS
IaaS
PaaS

Feedback

Question 7

Correct
Mark 2.00 out of 2.00
Flag question

Question text

A school administrator is concerned with the disclosure of student information due to a breach. Under which act is student information protected?
Select one:
COPPA
FERPA
HIPPA
CIPA

Feedback

Question 8

Correct
Mark 2.00 out of 2.00
Flag question

Question text

What are three disclosure exemptions that pertain to the FOIA? (Choose three.)
Select one or more:
confidential business information
non-geological information regarding wells
public information from financial institutions
information specifically non-exempt by statue
law enforcement records that implicate one of a set of enumerated concerns
national security and foreign policy information

Feedback

Question 9

Correct
Mark 2.00 out of 2.00
Flag question

Question text

An auditor is asked to assess the LAN of a company for potential threats. What are three potential threats the auditor may point out? (Choose three.)
Select one or more:
complex passwords
a misconfigured firewall
unlocked access to network equipment
the acceptable use policy
unauthorized port scanning and network probing
locked systems

Feedback

Question 10

Correct
Mark 2.00 out of 2.00
Flag question

Question text

A breach occurs in a company that processes credit card information. Which industry specific law governs credit card data protection?
Select one:
ECPA
SOX
PCI DSS
GLBA

Feedback

Question 11

Correct
Mark 2.00 out of 2.00
Flag question

Question text

As part of HR policy in a company, an individual may opt-out of having information shared with any third party other than the employer. Which law protects the privacy of personal shared information?
Select one:
GLBA
PCI
FIRPA
SOX

Feedback

Question 12

Correct
Mark 2.00 out of 2.00
Flag question

Question text

What are the three broad categories for information security positions? (Choose three.)
Select one or more:
doers
builders
creators
definers
seekers
monitors

Feedback

Question 13

Correct
Mark 2.00 out of 2.00
Flag question

Question text

What three services does CERT provide? (Choose three.)
Select one or more:
develop attack tools
develop tools, products, and methods to conduct forensic examinations
enforce software standards
resolve software vulnerabilities
create malware tools
develop tools, products, and methods to analyze vulnerabilities

Feedback

Question 14

Correct
Mark 2.00 out of 2.00
Flag question

Question text

Why is Kali Linux a popular choice in testing the network security of an organization?
Select one:
It is a network scanning tool that prioritizes security risks.
It is an open source Linux security distribution and contains over 300 tools.
It can be used to test weaknesses by using only malicious software.
It can be used to intercept and log network traffic.

Feedback

Question 15

Correct
Mark 2.00 out of 2.00
Flag question

Question text

What can be used to rate threats by an impact score to emphasize important vulnerabilities?
Select one:
NVD
CERT
ACSC
ISC

Feedback

Question 16

Correct
Mark 2.00 out of 2.00
Flag question

Question text

Unauthorized visitors have entered a company office and are walking around the building. What two measures can be implemented to prevent unauthorized visitor access to the building? (Choose two.)
Select one or more:
Conduct security awareness training regularly.
Lock cabinets.
Prohibit exiting the building during working hours.
Establish policies and procedures for guests visiting the building.

Feedback

Question 17

Correct
Mark 2.00 out of 2.00
Flag question

Question text

A security professional is asked to perform an analysis of the current state of a company network. What tool would the security professional use to scan the network only for security risks?
Select one:
vulnerability scanner
pentest
packet analyzer
malware

Feedback

Question 18

Correct
Mark 2.00 out of 2.00
Flag question

Question text

A consultant is hired to make recommendations on managing device threats in a company. What are three general recommendations that can be made? (Choose three.)
Select one or more:
Enforce strict HR policies.
Remove content filtering.
Enable media devices.
Enable screen lockout.
Disable administrative rights for users.
Enable automated antivirus scans.

Feedback

Question 19

Correct
Mark 2.00 out of 2.00
Flag question

Question text

As a security professional, there is a possibility to have access to sensitive data and assets. What is one item a security professional should understand in order to make informed ethical decisions?
Select one:
potential bonus
partnerships
potential gain
cloud providers
laws governing the data

Feedback


cisco Cybersecurity Essentials Quiz 8 answer in bold

Question  1 Correct Mark 2.00 out of 2.00 Flag question Question text A company has had several incidents involving users downloading unauth...