
CCST Cyber Flashcard Test #1

Flashcard
•
Information Technology (IT)
•
9th Grade
•
Hard
Wayground Content
FREE Resource
Student preview

8 questions
Show all answers
1.
FLASHCARD QUESTION
Front
A medical office employee sends emails to patients about their recent visits to the facility. What information would put the privacy of the patients at risk if it was included in the email?
Back
Patient records
Answer explanation
Explanation: An email message is transmitted in plain text and can be read by anyone who has access to the data while it is en route to a destination. Patient records include confidential or sensitive information that should be transmitted in a secure manner.
2.
FLASHCARD QUESTION
Front
What is the best way to avoid getting spyware on a machine? Options: Install the latest antivirus updates, Install the latest web browser updates, Install software only from trusted websites, Install the latest operating system updates
Back
Install software only from trusted websites
3.
FLASHCARD QUESTION
Front
Which certification meets the U.S. Department of Defense Directive 8570.01-M requirements for IT security in the federal government? Options: ISC2 Certified Information Systems Security Professional, ISACA CSX Cybersecurity Fundamentals, Microsoft Technology Associate Security Fundamentals, EC Council Certified Ethical Hacker, CompTIA Security+
Back
CompTIA Security+
Answer explanation
Explanation: This is an entry-level security certification that meets the U.S. Department of Defense Directive 8570.01-M requirements, which is an important item for anyone looking to work in IT security for the federal government.
4.
FLASHCARD QUESTION
Front
Which certification tests your understanding and knowledge in how to look for weaknesses and vulnerabilities in target systems using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner? Options: EC Council Certified Ethical Hacker, Palo Alto Networks Certified Cybersecurity Associate, ISC2 Certified Information Systems Security Professional, Microsoft Technology Associate Security Fundamentals, CompTIA Security+
Back
EC Council Certified Ethical Hacker
Answer explanation
Explanation: This certification tests your understanding and knowledge of how to look for weaknesses and vulnerabilities in target systems using the same knowledge and tools as a malicious hacker but in a lawful and legitimate manne
5.
FLASHCARD QUESTION
Front
If developers attempt to create their own security algorithms, it will likely introduce what type of vulnerabilities?
Back
Weaknesses in security practices
Answer explanation
Explanation: Systems and sensitive data can be protected through techniques such as authentication, authorization and encryption. Developers should stick to using security techniques and libraries that have already been created, tested and verified and should not attempt to create their own security algorithms. These will only likely introduce new vulnerabilities.
6.
FLASHCARD QUESTION
Front
Which of the following firewalls filters traffic based on source and destination IP addresses? Network layer firewall, Proxy server, Application layer firewall
Back
Network layer firewall
7.
FLASHCARD QUESTION
Front
Which of the following firewalls filters web content requests such as URLs and domain names? Application layer firewall, Proxy server, Reverse proxy server, Network layer firewall, Network address translation firewall
Back
Proxy server
8.
FLASHCARD QUESTION
Front
When describing malware, what is a difference between a virus and a worm?
Back
A virus replicates itself by attaching to another file, whereas a worm can replicate itself independently.
Answer explanation
Explanation: Malware can be classified as follows:
Virus (self-replicates by attaching to another program or file)
Worm (replicates independently of another program)
Trojan horse (masquerades as a legitimate file or program)
Rootkit (gains privileged access to a machine while concealing itself)
Spyware (collects information from a target system)
Adware (delivers advertisements with or without consent)
Bot (waits for commands from the hacker)
Ransomware (holds a computer system or data captive until payment is received)
Similar Resources on Wayground
7 questions
CISCO CCST Cyber Flashcard #2

Flashcard
•
9th - 12th Grade
11 questions
Malware and Viruses Mod.

Flashcard
•
7th - 8th Grade
10 questions
DPK Elemen 6 Flashcard

Flashcard
•
10th Grade
10 questions
W.63: Proxy Wars

Flashcard
•
9th Grade
10 questions
Online Safety

Flashcard
•
9th Grade
9 questions
Protecting Yourself

Flashcard
•
10th Grade
10 questions
Hacking Flashcard

Flashcard
•
11th Grade
10 questions
Cyber Security Careers

Flashcard
•
8th Grade
Popular Resources on Wayground
12 questions
Unit Zero lesson 2 cafeteria

Lesson
•
9th - 12th Grade
10 questions
Nouns, nouns, nouns

Quiz
•
3rd Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
25 questions
Multiplication Facts

Quiz
•
5th Grade
11 questions
All about me

Quiz
•
Professional Development
20 questions
Lab Safety and Equipment

Quiz
•
8th Grade
13 questions
25-26 Behavior Expectations Matrix

Quiz
•
9th - 12th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
Discover more resources for Information Technology (IT)
12 questions
Unit Zero lesson 2 cafeteria

Lesson
•
9th - 12th Grade
10 questions
Lab Safety Procedures and Guidelines

Interactive video
•
6th - 10th Grade
13 questions
25-26 Behavior Expectations Matrix

Quiz
•
9th - 12th Grade
10 questions
Exploring Digital Citizenship Essentials

Interactive video
•
6th - 10th Grade
20 questions
Lab Safety and Lab Equipment

Quiz
•
9th - 12th Grade
24 questions
Scientific method and variables review

Quiz
•
9th Grade
20 questions
Getting to know YOU icebreaker activity!

Quiz
•
6th - 12th Grade
6 questions
Secondary Safety Quiz

Lesson
•
9th - 12th Grade