1. “A defined way to breach the security of an IT system through a vulnerability” is the definition of which key cybersecurity term? A. Exploit
2. “A situation involving exposure to a danger.” Is the definition of which key cybersecurity term? A. Risk
3. A major metropolitan police department gets a warrant from a judge to hack into the computer of a suspected crime boss. A skilled penetration tester working for the department conducts the hack and retrieves incriminating evidence. What color hat does this officer wear? A. A White Hat
4. According to a 2018 report by Domo, over what period of time do the following things occur: 49,380 videos are uploaded to Instagram, 25,000 gifs are sent on Facebook Messenger, 4.2 million videos are viewed on Snapchat and 473,400 tweets are sent on Twitter? A. Every 1 minute
5. According to a Forbes Magazine study, the annual cost of cybercrime in the United States alone has reached how much? A. NOT $100M, NOT $1B, $10B, $100B
6. According to the Vulnerability Assessment Methodology, Vulnerabilities are determined by which 2 factors? A. Potential Impacts and Adaptive Capacity
7. Alice sends an encrypted message to Bob but it is intercepted by Trudy. Trudy cannot read it so, in anger, she deletes it without allowing its delivery to Bob. Which precept of the CIA Triad would have been violated? A. Availability
8. Alice sends an encrypted message to Bob but it is intercepted by Trudy. Trudy cannot read it but forwards it on to Bob from an anonymous address she controls. Which precept of the CIA Triad would have been violated? A. Integrity
9. Alice sends an unencrypted message to Bob but it is intercepted by Trudy. Trudy reads the message but does not in any way interfere with its content or delivery. Which precept of the CIA Triad would have been violated? A. Confidentiality
10. In addition to the movie War Games, what other event made the need for advanced cybersecurity apparent? A. NOT Confirmed reports of Al Qaeda operatives hacking the E-mail servers of US Government agencies., The attack against the USS Cole while it was in port in Yeman., The failed Bay of Pigs invasion., NOT 9/11
11. In the examples using Bob, Alice and Trudy, what aspect of cybersecurity is being illustrated? A. The security of communication between Alice and Bob that risks interception by Trudy.
12. Jeff Crume described five challenges in security today. Which two (2) of these are challenges because their numbers are decreasing? A. Needed knowledge, NOT Available time, MAYBE Available analysts, NOT Alerts, Threats
13. What was shown in the movie War Games that concerned President Reagan? A. A teenager hacked into a Pentagon computer that was capable of launching nuclear weapons.
14. What were the three (3) main cybersecurity concerns arising from the 9/11 attacks? A. How did this happen?, Could an attack like this happen in the virtual world too?, Could this happen again?
15. Which aspect of a comprehensive approach to cybersecurity includes these items: evaluate, create teams, establish baselines, identify and model threats, identify use cases, identify risks, establish monitoring and control requirements? A. Security program
16. Which of the following is considered a legitimate challenge to implementing a comprehensive cybersecurity solution? A. All of the above
17. Which three (3) are resources that are available to help guide penetration testing efforts by cybersecurity specialists? A. MAYBE Federal Financial Institutions Examination Council (EFIEC) Information Technology Examination., MAYBE Health Information Portability and Accountability Act (HIPAA), CORRECT NIST SP 800-42 Guidelines on Network Security Testing., CORRECT Open Source Security Testing Methodology Manual
(OSSTMM).
18. Who are Alice, Bob and Trudy? A. They are fictional characters used to illustrate how cryptography works.
Other Links:
See other websites for quiz:
Check on QUIZLET