CISCO CCST Cyber Flashcard #2

CISCO CCST Cyber Flashcard #2

Assessment

Flashcard

Information Technology (IT)

9th - 12th Grade

Hard

Created by

Quizizz Content

FREE Resource

Student preview

quiz-placeholder

7 questions

Show all answers

1.

FLASHCARD QUESTION

Front

What vulnerability occurs when data is written beyond the memory areas allocated to an application?

Back

Buffer overflow

2.

FLASHCARD QUESTION

Front

'Cryptocurrency transactions are digital.' Is this statement true or false?

Back

True

3.

FLASHCARD QUESTION

Front

What do you call a digital asset designed to work as a medium of exchange that uses strong encryption to secure a financial transaction?

Back

Cryptocurrency

4.

FLASHCARD QUESTION

Front

What name is given to a group of bots, connected through the Internet, with the ability to be controlled by a malicious individual or group?

Back

Botnet

5.

FLASHCARD QUESTION

Front

What is the best approach for preventing a compromised IoT device from maliciously accessing data and devices on a local network? Options: Install a software firewall on every network device, Place all IoT devices that have access to the Internet on an isolated network, Disconnect all IoT devices from the Internet, Set the security settings of workstation web browsers to a higher level

Back

Place all IoT devices that have access to the Internet on an isolated network

6.

FLASHCARD QUESTION

Front

Fill in the blank: The best approach to protect a data network from a compromised IoT device is to place all IoT devices on an ______ network.

Back

Isolated

7.

FLASHCARD QUESTION

Front

When there is no reply from the host, it indicates a problem with ______.

Back

Host availability