1. In the video Welcome to People, Process and Operating System Fundamentals for Cybersecurity, Alex mentions especially needing which two (2) technical skills and which two (2) soft skills?
Effective Communications and Critical Thinking
Firewalls and Antivirus
2. The statement: “The protection of computer systems from theft or damage to the hardware, software or information on them, as well as from disruption or misdirection of the services they provide.” Is a good definition for what?
IT Security
3. When looking at security standards and compliance, which three (3) are characteristics of best practices, baselines and frameworks?
They seek to improve performance, controls and metrics.
They help translate the business needs into technical or operational needs.
They are used to improved controls, methodologies and governance for the IT department.
4. Which three (3) of these roles would likely exist in an Information Security organization?
CISO, Chief Information Security Officer
Information Security Architect
Vulnerability Assessor
5. In the video Introduction to Process, which three (3) items were called out as critical to the success of a Security Operations Center (SOC)?
People
Tools
Process
6. Process performance metrics typically measure items in which four (4) categories?
Cost
Quality (defect rate)
Cycle time
Rework
7. Service Portfolio Management, Financial Management, Demand Management and Business Relationship Management belong to which ITIL Service Lifecycle Phase?
Service Strategy
8. The process in ITIL where changes are released to an IT environment is called what?
Release Management
9. Which two (2) processes are operational processes? (Select 2)
Change Management
Incident Management
10. Which two (2) of these are considered best practices? (Select 2)
Project Manager methodologies
ITIL
11. Which service management process has the responsibility of understanding the root cause of a problem?
Problem Management
12. In the video Welcome to People, Process and Operating System Fundamentals for Cybersecurity, Alex states that to be effective, a cybersecurity analyst must posses which two (2) types of skills? (Select 2)
Technical Skills
Soft Skills
13. This description belongs to which information security role? “This position is in charge of testing the effectiveness of computer information systems, including the security of the systems and reports their findings.”
Information Security Auditor
14. Which of these statements most accurately conveys what was stated in the video Introduction to Process?
As volumes of security alerts and false positives grow, more burden is placed upon Security Analysts & Incident Response teams.
15. Continual Process Improvement consists of which four (4) items? (Select 4)
Customer Feedback
Financial performance
Process Metrics
Maturity Assessments
16. Event Management, Incident Management, and Problem Management belong to which ITIL Service Lifecycle Phase?
Service Operations
17. Maintaining Information Security Policy (ISP) and specific security policies that address each aspect of strategy, objectives and regulations is the part of which ITIL process?
Information Security Management
18. In the Alice, Bob and Trudy examples, who is always portrayed as the intruder?
Trudy
19. Which aspect of the CIA Triad would cover preserving authorized restrictions on information access and disclosure?
Confidentiality
20. A message that Bob receives from Alice is genuine and can be verified as such demonstrates which key property?
Authenticity
21. The unauthorized disclosure of information would violate which aspect of the CIA Triad?
Confidentiality
22. Which aspect of the CIA Triad would cover ensuring information non-repudiation and authenticity?
Integrity
23. If Trudy intercepts and reads a message that Alice is sending to Bob, and then she deletes it without allowing it to be delivered, which 2 aspects of the CIA Triad have been violated?
Availability & Confidentiality
24. Which is the correct order for gaining access to a resource?
Identification, Authentication, Authorization, Accountability
26. Which type of method would include “Something you know”, such as a password?
Authentication
27. Which three (3) are common methods of access control?
Mandatory Access Control (MAC)
Discretionary Access Control (DAC)
Role Based Access Control (RBAC)
28. Which three (3) items would be considered Physical Access Control methods?
Work areas
Perimetral
Building
29. Identify the three (3) security functions associated with AAA.
Authentication
Accountability (Accounting)
Authorization
30. Which statement best describes Discretionary Access Control (DAC)?
Each object (folder or file) has an owner and the owner defines the rights and privilege.
31. Which is an example of technical uses of physcial security controls?
All of the above.
32. Name one of the three control types.
Physical ^_^
33. Which of the following is NOT an authentication method?
Something you get
34. Hamid has access to certain resources because he is a Quality Control Inspector and he has access to other resources because he is the manager of that team. Which form of access control is his company most likely using?
Role Based Access Control (RBAC)
35. Which two (2) of these are useful tools used to monitor network access control processes?
Sniffers
36. Access Control Lists (ACL)
HoneyPots
37. How many unique address spaces are used by applications running in kernel mode?
1
38. Which two (2) of these file systems could you use to format a 64 GB USB drive?
NTFS
FAT32
39. Where does Windows 10 store 64-bit applications?
\Program Files
40. Which shortcut will close all applications?
Alt+F4
41. What is the shortcut for saving a screenshot?
Win+PrtScn
42. What Windows mode do users interact with directly?
User mode
43. What does Windows create every time an applications is started in user mode?
A process.
44. If you are setting up a new Windows laptop with a 128Gb hard drive and you want only a single file partition on the drive, which file systems can choose from?
NTFS
45. A file name in Windows must be unique where?
Within the same directory.
46. Windows 10 can be purchased for which versions?
32 bit or 64 bit.
47. If you want to roll back or undo an action, what shortcut should you use?
Ctrl-Z
48. Which shortcut will switch between running applications?
Alt-Tab
49. Where does Windows 10 store 32-bit applications?
\Program Files (x86)
50. What is the shortcut to open the Task Manager
Ctrl+Alt+Del
Ctrl+Shift+Esc
51. Which three (3) statements about Linux are True?
Linux is an open source operating system.
Linux guarantees end users freedom to run, study, share, and modify the software.
Linux is licensed under the General Public License (GNU).
52. Executable files such as ping, grep and cp are stored in which directory?
/bin
53. The Linux “kill” command does which of the following?
Stop an executing process.
54. What permissions can be set on a file in Linux?
read, write, execute
57. Which basic Linux command deletes an empty directory?
rmdir
58. Which is not a group that can own a file?
anybody
59. Your organization uses a Linux-based network. The legal department has a user group called legal, and this group has access to all the directories that legal employees need. A new legal employee, John J. Smith, just started, and his username is jjsmith. Which command can you use to grant John access to the same directories as all other legal employees?
sudousermod -a -G legal jjsmith
60. Which three (3) groups can “own” a file in Linux?
user, group, everybody
61. What can be known about a file with permissions set to “-rwxr-x-r–“?
The file is not a directory; the user can read, write and execute the file; the group cannot modify the file, and others not in the group an read it only.
62. A person using Linux would normally interact directly with which?
The shell.
63. In the Linux file system, what is the highest level in the directory structure?
root
64. In Linux, a directory is a special type of ____.
file
65. What does the nano command do?
nano is a basic text file editor.
66. When configuring a new application, in which directory should you have it save log files?
/var
67. Application configuration files are usually stored in which directory?
/bin
/log
68. The Linux “cat” command does which of the following?
Concatenates 2 or more files together.
69. Your organization uses a Linux-based network, and you’re configuring Uncomplicated Firewall (ufw). You want to disable file transfers that use the File Transfer Protocol (FTP), which occurs on port 21. Which command can you use to block all traffic on this port?
sudoufw deny 21
70. What application can you use to see all the active running applications and processes on macOS?
Activity Monitor
71. What feature in macOS prevents unauthorized applications from being installed?
Gatekeeper
72. Which three (3) utilities are found when booting macOS to the recovery partition? (Select 3)
Safari
Disk Utility
Time Machine
73. Where does the hypervisor sit in a virtual architecture?
Between the hardware and the operating system(s).
74. Which are the first two steps to perform in a cloud deployment?
Consolidate and Virtualize
75. Which are the three (3) most common forms of Cloud computing?
Private Cloud
Public Cloud
Hybrid Cloud
76. Which type of cloud is the best choice for a start-up company with no existing IT infrastructure and limited funds?
Public Cloud
77. Which three (3) are the primary benefits of cloud computing?
Strategic Value
Flexibility
Efficiency
78. Which is a primary security consideration in a cloud environment?
All of the above.
79. Virtualization allows you to create multiple simulated environments or dedicated resources from how many physical hardware systems?
1
80. What relays requests from the VM to the actual hardware?
Hypervisor
81. Which two steps of a cloud deployment are performed after you move your applications to the cloud?
Integrate and Optimize
82. Which type of cloud is the best choice for a company with a robust existing IT infrastructure and very serious data privacy concerns?
Private Cloud
83. Which is a primary security consideration in a cloud environment?
All of the above.
Other Links:
See other websites for quiz:
Check on QUIZLET