CCST Test #3 for cert exam

CCST Test #3 for cert exam

Assessment

Flashcard

Information Technology (IT)

9th Grade

Hard

Created by

Quizizz Content

FREE Resource

Student preview

quiz-placeholder

12 questions

Show all answers

1.

FLASHCARD QUESTION

Front

An employee is at a restaurant with friends and tells them about an exciting new video game that is under development at the organization they work for. Is this employee’s behavior ethical or unethical?

Back

Unethical

Answer explanation

In cybersecurity, "ethical" refers to practices that follow established moral principles, respecting user privacy, data integrity, and legal boundaries, while "unethical" describes actions that exploit vulnerabilities for personal gain, violate privacy, or intentionally cause harm, often involving unauthorized access and malicious intent; essentially, ethical cybersecurity professionals work to protect data and systems, while unethical actors aim to breach them for personal benefit.

2.

FLASHCARD QUESTION

Front

In networking, what name is given to the identifier at both ends of a transmission to ensure that the right data is passed to the correct application?

Back

Port number

Answer explanation

IP address: A unique numerical identifier assigned to a device on a network, allowing data to be routed to that specific device; essentially a "logical address" for a computer on the internet.

Port number: A specific number associated with a service or application running on a device, used to direct incoming data to the correct program on that device.

MAC address: A unique hardware identifier burned into a network interface card (NIC), used to identify a device on a local network at the physical level.

Sequence number: A number assigned to each packet of data in a sequence, used to ensure data is received in the correct order during transmission.

3.

FLASHCARD QUESTION

Front

‘An employee does something as an organization representative with the knowledge of that organization and this action is deemed illegal. The organization is legally responsible for this action.’ Is this statement true or false?

Back

True

Answer explanation

The legal principle of "respondeat superior," which means "let the master answer" - meaning the employer can be held liable for the actions of their employees, especially when those actions are performed within the scope of their employment and while representing the company.

Scope of employment: If an employee commits an illegal act while carrying out their assigned duties or acting on behalf of the company, the organization can be held responsible.

Apparent authority: Even if an employee is not explicitly authorized to perform a specific action, if they appear to be acting as a company representative to a third party, the company may still be liable.

4.

FLASHCARD QUESTION

Front

‘A data breach does not impact the reputation of an organization.’ Is this statement true or false?

Back

False

Answer explanation

A data breach significantly impacts an organization's reputation because it exposes sensitive customer information, leading to a loss of trust from customers, partners, and the public, resulting in negative media attention and a perception that the company cannot adequately protect sensitive data, potentially damaging their credibility and brand image.

5.

FLASHCARD QUESTION

Front

For what purpose would a network administrator use the Nmap tool?

Back

To detect and identify open ports.

Answer explanation

Nmap, which stands for "Network Mapper", is a free and open-source tool used to scan networks and discover active devices, identify open ports on those devices, detect the services running on those ports, and gather information about the operating systems running on them, essentially creating a detailed map of a network to assess its security posture and identify potential vulnerabilities; making it a valuable tool for network administrators and security professionals.

6.

FLASHCARD QUESTION

Front

What type of attack uses zombies?

Back

DDoS

Answer explanation

Explanation: A Distributed DoS (DDoS) attack is similar to a DoS attack but originates from multiple, coordinated sources. For example:

• An attacker builds a network (botnet) of infected hosts called zombies, which are controlled by handler systems.

• The zombie computers will constantly scan and infect more hosts, creating more and more zombies.

• When ready, the hacker will instruct the handler systems to make the botnet of zombies carry out a DDoS attack.

7.

FLASHCARD QUESTION

Front

What is the purpose of a backdoor?

Back

To gain unauthorized access to a system without normal authentication procedures

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?