CCST Test #2 for cert exam
Flashcard
•
Information Technology (IT)
•
9th Grade
•
Practice Problem
•
Hard
Wayground Content
FREE Resource
Student preview

9 questions
Show all answers
1.
FLASHCARD QUESTION
Front
What vulnerability occurs when data is written beyond the memory areas allocated to an application?
Back
Buffer overflow
2.
FLASHCARD QUESTION
Front
An organization’s IT department reports that their web server is receiving an abnormally high number of web page requests from different locations simultaneously. What type of security attack is occurring?
Back
DDoS
3.
FLASHCARD QUESTION
Front
‘Cryptocurrency transactions are digital.’ Is this statement true or false?
Back
True
Answer explanation
Cryptocurrency, also known as crypto, is a digital currency that operates on a computer network without the need for a central authority like a bank or government. Cryptocurrencies use cryptographic techniques to allow users to spend them securely without a central authority.
Examples: Bitcoin and Ethereum are examples of cryptocurrencies. Bitcoin was originally developed to be a payment method that wasn't controlled by a central bank. Ethereum uses the same technology as Bitcoin, but it can be used to pay for transactions on the Ethereum network. Cryptocurrencies can be stored online or offline. A hot wallet is a type of crypto wallet that offers online storage, but it's more susceptible to cyber-attacks.
4.
FLASHCARD QUESTION
Front
What do you call a digital asset designed to work as a medium of exchange that uses strong encryption to secure a financial transaction?
Back
Cryptocurrency
5.
FLASHCARD QUESTION
Front
What name is given to a group of bots, connected through the Internet, with the ability to be controlled by a malicious individual or group?
Back
Botnet
Answer explanation
In cybersecurity, a "hacker network" refers to a group of hackers who collaborate online, often for malicious purposes; a "crime syndicate" is a organized group of criminals who use cybercrime tactics to commit illegal activities; a "zombie" is a compromised computer infected with malware, essentially acting as a puppet under the control of a hacker; and a "botnet" is a network of multiple "zombie" computers controlled by a single entity, allowing them to perform large-scale malicious actions like sending spam or launching DDoS attacks.
6.
FLASHCARD QUESTION
Front
What is the best approach for preventing a compromised IoT device from maliciously accessing data and devices on a local network? Options: Install a software firewall on every network device, Place all IoT devices that have access to the Internet on an isolated network, Disconnect all IoT devices from the Internet, Set the security settings of workstation web browsers to a higher level
Back
Place all IoT devices that have access to the Internet on an isolated network
Answer explanation
Explanation: The best approach to protect a data network from a possibly compromised IoT device is to place all IoT devices on an isolated network that only has access to the Internet.
7.
FLASHCARD QUESTION
Front
A port scan returns an ‘open’ response. What does this mean?
Back
A service is listening on the port
Answer explanation
When a port scan returns an "open" response, it means that the targeted network port is actively listening for incoming connections and is ready to accept data, indicating that a service on that port is currently running and accessible; essentially, the port is available for communication.
Open ports indicate that the target server or network is actively accepting connections or datagrams and has responded with a packet that indicates it is listening. It also indicates that the service used for the scan (typically TCP or UDP) is in use as well.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
10 questions
Avaliação 8º ANO
Flashcard
•
8th Grade
2 questions
Preparation of Salts
Flashcard
•
7th - 9th Grade
5 questions
Introduction to Software Engineering
Flashcard
•
KG
5 questions
Wisha and the Bookworm Quiz
Flashcard
•
9th Grade
8 questions
Graphic Novels Vocabulary
Flashcard
•
7th Grade
6 questions
Vacation to Turkey
Flashcard
•
10th Grade
11 questions
Daily Activities and Time Expressions
Flashcard
•
9th Grade
10 questions
Basic Concepts of Probability
Flashcard
•
8th Grade
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
•
3rd Grade
20 questions
Equivalent Fractions
Quiz
•
3rd Grade
25 questions
Multiplication Facts
Quiz
•
5th Grade
54 questions
Analyzing Line Graphs & Tables
Quiz
•
4th Grade
22 questions
fractions
Quiz
•
3rd Grade
20 questions
Main Idea and Details
Quiz
•
5th Grade
20 questions
Context Clues
Quiz
•
6th Grade
15 questions
Equivalent Fractions
Quiz
•
4th Grade
Discover more resources for Information Technology (IT)
20 questions
El Verbo IR Practice
Quiz
•
9th Grade
10 questions
Understanding Meiosis
Interactive video
•
6th - 10th Grade
20 questions
Graphing Inequalities on a Number Line
Quiz
•
6th - 9th Grade
15 questions
Making Inferences
Quiz
•
7th - 12th Grade
15 questions
Main Idea and Supporting Details.
Quiz
•
4th - 11th Grade
18 questions
SAT Prep: Ratios, Proportions, & Percents
Quiz
•
9th - 10th Grade
12 questions
Exponential Growth and Decay
Quiz
•
9th Grade
12 questions
Add and Subtract Polynomials
Quiz
•
9th - 12th Grade