CCST Test #3 for cert exam

Flashcard
•
Information Technology (IT)
•
9th Grade
•
Hard
Quizizz Content
FREE Resource
Student preview

12 questions
Show all answers
1.
FLASHCARD QUESTION
Front
An employee is at a restaurant with friends and tells them about an exciting new video game that is under development at the organization they work for. Is this employee’s behavior ethical or unethical?
Back
Unethical
Answer explanation
In cybersecurity, "ethical" refers to practices that follow established moral principles, respecting user privacy, data integrity, and legal boundaries, while "unethical" describes actions that exploit vulnerabilities for personal gain, violate privacy, or intentionally cause harm, often involving unauthorized access and malicious intent; essentially, ethical cybersecurity professionals work to protect data and systems, while unethical actors aim to breach them for personal benefit.
2.
FLASHCARD QUESTION
Front
In networking, what name is given to the identifier at both ends of a transmission to ensure that the right data is passed to the correct application?
Back
Port number
Answer explanation
IP address: A unique numerical identifier assigned to a device on a network, allowing data to be routed to that specific device; essentially a "logical address" for a computer on the internet.
Port number: A specific number associated with a service or application running on a device, used to direct incoming data to the correct program on that device.
MAC address: A unique hardware identifier burned into a network interface card (NIC), used to identify a device on a local network at the physical level.
Sequence number: A number assigned to each packet of data in a sequence, used to ensure data is received in the correct order during transmission.
3.
FLASHCARD QUESTION
Front
‘An employee does something as an organization representative with the knowledge of that organization and this action is deemed illegal. The organization is legally responsible for this action.’ Is this statement true or false?
Back
True
Answer explanation
The legal principle of "respondeat superior," which means "let the master answer" - meaning the employer can be held liable for the actions of their employees, especially when those actions are performed within the scope of their employment and while representing the company.
Scope of employment: If an employee commits an illegal act while carrying out their assigned duties or acting on behalf of the company, the organization can be held responsible.
Apparent authority: Even if an employee is not explicitly authorized to perform a specific action, if they appear to be acting as a company representative to a third party, the company may still be liable.
4.
FLASHCARD QUESTION
Front
‘A data breach does not impact the reputation of an organization.’ Is this statement true or false?
Back
False
Answer explanation
A data breach significantly impacts an organization's reputation because it exposes sensitive customer information, leading to a loss of trust from customers, partners, and the public, resulting in negative media attention and a perception that the company cannot adequately protect sensitive data, potentially damaging their credibility and brand image.
5.
FLASHCARD QUESTION
Front
For what purpose would a network administrator use the Nmap tool?
Back
To detect and identify open ports.
Answer explanation
Nmap, which stands for "Network Mapper", is a free and open-source tool used to scan networks and discover active devices, identify open ports on those devices, detect the services running on those ports, and gather information about the operating systems running on them, essentially creating a detailed map of a network to assess its security posture and identify potential vulnerabilities; making it a valuable tool for network administrators and security professionals.
6.
FLASHCARD QUESTION
Front
What type of attack uses zombies?
Back
DDoS
Answer explanation
Explanation: A Distributed DoS (DDoS) attack is similar to a DoS attack but originates from multiple, coordinated sources. For example:
• An attacker builds a network (botnet) of infected hosts called zombies, which are controlled by handler systems.
• The zombie computers will constantly scan and infect more hosts, creating more and more zombies.
• When ready, the hacker will instruct the handler systems to make the botnet of zombies carry out a DDoS attack.
7.
FLASHCARD QUESTION
Front
What is the purpose of a backdoor?
Back
To gain unauthorized access to a system without normal authentication procedures
Create a free account and access millions of resources
Similar Resources on Wayground
10 questions
Vocab Flashcard E103

Flashcard
•
9th - 10th Grade
10 questions
Political and Economic Regions

Flashcard
•
9th - 10th Grade
10 questions
Political and Economic Regions

Flashcard
•
9th - 10th Grade
15 questions
Jobs

Flashcard
•
9th Grade
13 questions
Business Management 3.04 Business Policy - Flashcard

Flashcard
•
9th Grade
9 questions
CODA

Flashcard
•
9th Grade
9 questions
CODA

Flashcard
•
9th Grade
9 questions
Levels Of Organization

Flashcard
•
9th - 10th Grade
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade