Module 1: Introduction to Cybersecurity Quiz Answers
Which definition accurately describes information security (InfoSec)?
- The practice of protecting computer networks, devices, and digital information, whether on-premises or in the cloud.
- The management of critical infrastructure, such as pipelines, electrical power grids, and data centers in the cloud.
- The processes for preventing, detecting, and remediating attacks on sensitive information, both digital and physical.
- The control of physical access to a building or room where sensitive data is stored, either digitally or physically.
Which definition accurately describes cybersecurity?
- The protection of information systems against unauthorized access, modification, and so on
- The management of critical infrastructure, such as pipelines and electrical power grids
- The practice of protecting computer networks, devices, and digital information
- The protection of all information that has been deemed sensitive
Which cybersecurity term does one of the letters in AAA stand for?
- Anonymity
- Alerts
- Accounting
- Acceptability
What is one of the first things that you need to do before implementing safeguards to information?
- Verify with government regulations if information requires protection.
- Determine what information needs to be protected.
- Conduct criminal record checks on all employees.
- Carry out a data integrity check on all sensitive data.
Which is the most accurate definition of authentication in cybersecurity?
- The practice of verifying activities on computer devices
- The act of certifying that someone can perform an action
- The act of identifying and verifying a person or thing
- The process of controlling access to resource
In addition to the five categories of cybersecurity, what else do you need to consider when defending the cyber space?
- Executive strategic planning
- Computer code
- ISO standards
- People and processes
Which is the most accurate definition of authorization in cybersecurity?
- The act of identifying and verifying a person or thing
- The act of certifying that someone can perform an action
- The practice of verifying activities on computer devices
- The process of controlling access to resources
What are the three principles of information security (InfoSec), also known as the CIA triad? (Choose three.)
- Accountability
- Availability
- Integrity
- Incorruptibility
- Confidentiality
Which two elements of cybersecurity must be addressed when defending computer networks? (Choose two.)
- Physical access points
- Computer technology vulnerabilities
- Human behavior
- Information left on desks or in public places
What are two categories of cybersecurity? (Choose two.)
- Critical infrastructure
- Security accreditation for employees
- Network security
- Building access security
Which three principals make up the DAD triad? (Choose three.)
- Disclosure
- Denial
- Alteration
- Anonymized data
- Domain spoofing
Which definition accurately describes information systems security?
- The practice of protecting computer networks, devices, and digital information
- The management of information systems, including disaster recovery (DR) and high availability (HA)
- The control of physical access to a building or room where sensitive data is stored
- The protection of information systems against unauthorized access, modification, and so on
Module 2: The Threat Landscape Quiz Answers
Which definition best represents the Cyber Kill Chain?
- Chronicles the chain reaction of a cyber attack
- Details how to respond at each stage of a cyber attack
- Describes the stages of a cyber attack
- Illustrates how a cyber attack is killed
Which bad actor type is motivated by notoriety?
- Explorer
- Cyber terrorist
- Cybercriminal
- Adventurer
Which bad actor type is motivated by ideology?
- Hacktivist
- Cyber ideologue
- Cyber warrior
- Explorer
Which system or organization assigns a severity score to help you identify the most dangerous cyberthreats to your organization?
- Federal Bureau of Investigation (FBI)
- Cyberthreat rating system unanimous (CRSU)
- National Institute of Standards and Technology (NIST)
- Common vulnerability scoring system (CVSS)
Which standard develops a common language for cyberthreat information?
- Structured threat information expression (STIX)
- MITRE ATT&CK
- Common vulnerability scoring system (CVSS)
- Cyberthreats vernacular (CTV)
Which two attack vector categories characterize a ransomware attack? (Choose two.)
- Computer technology
- Pre-exploit
- Post-exploit
- Human
What are the two ingredients of a successful social engineering attack? (Choose two.)
- Gaining the trust of the victim
- Denying the victim access to a server or service
- Compelling the victim to act, such as instilling a sense of urgency
- Stealing the victim’s credentials by watching them as they log in
- Breaching the victim’s computer by exploiting a weakness in an application
Which step is the final action in the threat intelligence process?
- Identifying which threats must be mitigated
- Providing feedback and a review of lessons learned
- Eliminating threats
- Disseminating threat information
Which expression would best qualify as threat intelligence?
- A list of malicious IP addresses and domain names
- Security implications and actionable advice
- News of a cyberattack on another organization’s network
- Data feeds from a Security Information and Event Manager (SIEM)
Which bad actor type prefers ransomware as an attack method?
- Cyber extortionist
- Cyber terrorist
- Cybercriminal
- Cyber warrior
What is a benefit of using MITRE ATT@CK?
- Provides a common taxonomy for understanding and mitigating cyberattacks
- Supplies superior services at a lower cost than its competitors
- Presents more cyber attack details than other methods, such as Cyber Kill Chain
- Offers off-the-shelf security software solutions
Which sequence of a Cyber Kill Chain show the events occurring in the correct order?
- Reconnaissance, delivery, weaponization, exploitation, installation, command and control, exfiltration
- Weaponization, reconnaissance, delivery, exploitation, installation, command and control, exfiltration
- Weaponization, reconnaissance, delivery, installation, exploitation, command and control, exfiltration
- Reconnaissance, weaponization, delivery, exploitation, installation, command and control, exfiltration
Manipulating people to do something contrary to their interests is an example of which cybersecurity threat category?
- Malware
- System design failure
- Social engineering
- Unauthorized access
Which three requisite qualities must information have for it to be threat intelligence? (Choose three.)
- Detailed
- Contextual
- Actionable
- Timely
- Relevant
Which cybersecurity threat category would a trojan horse be an example of?
- Malware
- Unauthorized access
- Social engineering
- System design failure
Which hacker type is someone employed by a computer security consulting firm who could be hired to do penetration testing?
- Green hat
- Black hat
- Grey hat
- Blue hat
Module 3: Social Engineering Quiz Answers
Which attack vector does an influence campaign rely upon?
- Zero-trust software exploit
- Social media
- Messaging service
Which description best explains pharming?
- Recruiting employees through various means to carry out an insider attack
- Exploiting an unknown vulnerability in computer software
- Cultivating trust between a bad actor and the target through chance encounters
- Computer traffic redirected from a legitimate website to a malicious one
What type of insider threat is an individual who believes they are exempt from their organization’s security policies and bypasses them?
- Lone wolf
- Collaborator
- Pawn
- Goof
Which threat indicator could be an indication of an active insider threat?
- An employee shows contempt for an organization’s policies
- An open pot of honey is suspiciously left on a kitchen countertop
- A USB drive is found abandoned in an organization’s parking lot
- Two employees disagree on the interpretation of a security policy
Which two insider types are considered malicious insider threats? (Choose two.)
- Rats
- Pawns
- Lone wolves
- Moles
Which definition best describes insider threat?
- An unknown vulnerability on a computer network
- A person posing a threat to an organization from within
- IT security fails to protect its network
- Employees who are angry at their employer
Which two reasons explain why influence campaigns are often effective?
- Social media offers an inexpensive means to influence a large number of people
- The bad actor can remain anonymous using fake accounts
- Blackmail and bribery are effective in influencing people’s behavior
- People are known to respond favorably to a well-reasoned argument
Which three attack methods are examples of social engineering? (Choose three.)
- Whaling
- Copycat
- Honeypot
- Zero day
- Tailgating
What objective is accomplished by the last two stages of an influence campaign?
- Clarification of the narrative
- Access to the target’s network
- Theft of information or money
- Amplification of the message
What type of attack method is used by a blue hat to study the tactics of bad actors?
- Sandboxing
- Deception
- Honeypot
- Waterholing
Which attack method relies on a telephone or voice-over-IP to target individuals or small groups, such as members of a finance department?
- Vishing
- Honeypot
- Smishing
- Whaling
Which technique most accurately describes social engineering?
- Exploiting computer weaknesses
- Psychological manipulation
- Quid pro quo
- Zero-day attack
What social engineering attack uses an online site frequented by the target or targets to attack them?
- Waterholing
- Quid pro quo
- Phishing
- Pretexting
Module 4: Malware Quiz Answers
What is the mechanism part of an attack vector in a DDoS attack?
- Bots
- Public IP address
- Web service
- Routers
Which type of malware does not need a host system and spreads to other computers without user action?
- Virus
- Worm
- Ransomware
- Potentially Unwanted Program (PUP)
Which three components comprise a threat vector? (Choose three.)
- Mechanism
- Payload
- Threat landscape
- Pathway
- Vulnerability
Which statement best describes an Easter egg mechanism?
- A hidden feature in code that may be activated for malicious purposes.
- A program that “lays an egg”, in effect producing a malicious app.
- The process of decorating an egg in celebration of Easter.
- A set of instructions that executes a command to take control of a computer.
What type of malware do these characteristics describe?
- User activated
- Malware inserts or attaches itself to legitimate programs
- Spreads to other computers
- Virus
- Worm
- Keylogger
- Rootkit
Which type of malware secretly steals information about computer activity?
- Rootkit
- Spyware
- Worm
- Browser hijacker
Which two symptoms might indicate that your computer is infected with malware? (Choose two.)
- Failing hard drive
- OS updates automatically
- Self-executing programs
- Sudden degraded performance
Which statement best describes an attack surface?
- The number of pathways to a vulnerability
- The sum of vulnerabilities
- The method to exploit a vulnerability
- The total number of bad actors