CCST Test #2 for cert exam

CCST Test #2 for cert exam

Assessment

Flashcard

Information Technology (IT)

9th Grade

Hard

Created by

Quizizz Content

FREE Resource

Student preview

quiz-placeholder

9 questions

Show all answers

1.

FLASHCARD QUESTION

Front

What vulnerability occurs when data is written beyond the memory areas allocated to an application?

Back

Buffer overflow

2.

FLASHCARD QUESTION

Front

An organization’s IT department reports that their web server is receiving an abnormally high number of web page requests from different locations simultaneously. What type of security attack is occurring?

Back

DDoS

3.

FLASHCARD QUESTION

Front

‘Cryptocurrency transactions are digital.’ Is this statement true or false?

Back

True

Answer explanation

Cryptocurrency, also known as crypto, is a digital currency that operates on a computer network without the need for a central authority like a bank or government. Cryptocurrencies use cryptographic techniques to allow users to spend them securely without a central authority.

Examples: Bitcoin and Ethereum are examples of cryptocurrencies. Bitcoin was originally developed to be a payment method that wasn't controlled by a central bank. Ethereum uses the same technology as Bitcoin, but it can be used to pay for transactions on the Ethereum network. Cryptocurrencies can be stored online or offline. A hot wallet is a type of crypto wallet that offers online storage, but it's more susceptible to cyber-attacks.

4.

FLASHCARD QUESTION

Front

What do you call a digital asset designed to work as a medium of exchange that uses strong encryption to secure a financial transaction?

Back

Cryptocurrency

5.

FLASHCARD QUESTION

Front

What name is given to a group of bots, connected through the Internet, with the ability to be controlled by a malicious individual or group?

Back

Botnet

Answer explanation

In cybersecurity, a "hacker network" refers to a group of hackers who collaborate online, often for malicious purposes; a "crime syndicate" is a organized group of criminals who use cybercrime tactics to commit illegal activities; a "zombie" is a compromised computer infected with malware, essentially acting as a puppet under the control of a hacker; and a "botnet" is a network of multiple "zombie" computers controlled by a single entity, allowing them to perform large-scale malicious actions like sending spam or launching DDoS attacks.

6.

FLASHCARD QUESTION

Front

What is the best approach for preventing a compromised IoT device from maliciously accessing data and devices on a local network? Options: Install a software firewall on every network device, Place all IoT devices that have access to the Internet on an isolated network, Disconnect all IoT devices from the Internet, Set the security settings of workstation web browsers to a higher level

Back

Place all IoT devices that have access to the Internet on an isolated network

Answer explanation

Explanation: The best approach to protect a data network from a possibly compromised IoT device is to place all IoT devices on an isolated network that only has access to the Internet.

7.

FLASHCARD QUESTION

Front

A port scan returns an ‘open’ response. What does this mean?

Back

A service is listening on the port

Answer explanation

When a port scan returns an "open" response, it means that the targeted network port is actively listening for incoming connections and is ready to accept data, indicating that a service on that port is currently running and accessible; essentially, the port is available for communication.

Open ports indicate that the target server or network is actively accepting connections or datagrams and has responded with a packet that indicates it is listening. It also indicates that the service used for the scan (typically TCP or UDP) is in use as well.

8.

FLASHCARD QUESTION

Front

What happens when connections to the port are denied?

Back

The connection is blocked.

9.

FLASHCARD QUESTION

Front

What is the reason when there is no reply from the host?

Back

The host is offline

Answer explanation

In cybersecurity, a "no reply from the host" situation usually indicates that the target computer or server is either offline, not reachable due to network issues, actively blocking communication (like with a firewall), experiencing technical problems, or intentionally configured to not respond to incoming requests; essentially, it means the system is not sending a response to your attempts to contact it.