
CISCO CCST Cyber Flashcard #2
Flashcard
•
Information Technology (IT)
•
9th - 12th Grade
•
Practice Problem
•
Hard
Wayground Content
FREE Resource
Student preview

7 questions
Show all answers
1.
FLASHCARD QUESTION
Front
What vulnerability occurs when data is written beyond the memory areas allocated to an application?
Back
Buffer overflow
2.
FLASHCARD QUESTION
Front
'Cryptocurrency transactions are digital.' Is this statement true or false?
Back
True
3.
FLASHCARD QUESTION
Front
What do you call a digital asset designed to work as a medium of exchange that uses strong encryption to secure a financial transaction?
Back
Cryptocurrency
4.
FLASHCARD QUESTION
Front
What name is given to a group of bots, connected through the Internet, with the ability to be controlled by a malicious individual or group?
Back
Botnet
5.
FLASHCARD QUESTION
Front
What is the best approach for preventing a compromised IoT device from maliciously accessing data and devices on a local network? Options: Install a software firewall on every network device, Place all IoT devices that have access to the Internet on an isolated network, Disconnect all IoT devices from the Internet, Set the security settings of workstation web browsers to a higher level
Back
Place all IoT devices that have access to the Internet on an isolated network
6.
FLASHCARD QUESTION
Front
Fill in the blank: The best approach to protect a data network from a compromised IoT device is to place all IoT devices on an ______ network.
Back
Isolated
7.
FLASHCARD QUESTION
Front
When there is no reply from the host, it indicates a problem with ______.
Back
Host availability
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?