CCST Cyber Flashcard Test #1

CCST Cyber Flashcard Test #1

Assessment

Flashcard

Created by

Quizizz Content

Information Technology (IT)

9th Grade

Hard

Student preview

quiz-placeholder

8 questions

Show all answers

1.

FLASHCARD QUESTION

Front

A medical office employee sends emails to patients about their recent visits to the facility. What information would put the privacy of the patients at risk if it was included in the email?

Back

Patient records

Answer explanation

Explanation: An email message is transmitted in plain text and can be read by anyone who has access to the data while it is en route to a destination. Patient records include confidential or sensitive information that should be transmitted in a secure manner.

2.

FLASHCARD QUESTION

Front

What is the best way to avoid getting spyware on a machine? Options: Install the latest antivirus updates, Install the latest web browser updates, Install software only from trusted websites, Install the latest operating system updates

Back

Install software only from trusted websites

3.

FLASHCARD QUESTION

Front

Which certification meets the U.S. Department of Defense Directive 8570.01-M requirements for IT security in the federal government? Options: ISC2 Certified Information Systems Security Professional, ISACA CSX Cybersecurity Fundamentals, Microsoft Technology Associate Security Fundamentals, EC Council Certified Ethical Hacker, CompTIA Security+

Back

CompTIA Security+

Answer explanation

Explanation: This is an entry-level security certification that meets the U.S. Department of Defense Directive 8570.01-M requirements, which is an important item for anyone looking to work in IT security for the federal government.

4.

FLASHCARD QUESTION

Front

Which certification tests your understanding and knowledge in how to look for weaknesses and vulnerabilities in target systems using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner? Options: EC Council Certified Ethical Hacker, Palo Alto Networks Certified Cybersecurity Associate, ISC2 Certified Information Systems Security Professional, Microsoft Technology Associate Security Fundamentals, CompTIA Security+

Back

EC Council Certified Ethical Hacker

Answer explanation

Explanation: This certification tests your understanding and knowledge of how to look for weaknesses and vulnerabilities in target systems using the same knowledge and tools as a malicious hacker but in a lawful and legitimate manne

5.

FLASHCARD QUESTION

Front

If developers attempt to create their own security algorithms, it will likely introduce what type of vulnerabilities?

Back

Weaknesses in security practices

Answer explanation

Explanation: Systems and sensitive data can be protected through techniques such as authentication, authorization and encryption. Developers should stick to using security techniques and libraries that have already been created, tested and verified and should not attempt to create their own security algorithms. These will only likely introduce new vulnerabilities.

6.

FLASHCARD QUESTION

Front

Which of the following firewalls filters traffic based on source and destination IP addresses? Network layer firewall, Proxy server, Application layer firewall

Back

Network layer firewall

7.

FLASHCARD QUESTION

Front

Which of the following firewalls filters web content requests such as URLs and domain names? Application layer firewall, Proxy server, Reverse proxy server, Network layer firewall, Network address translation firewall

Back

Proxy server

8.

FLASHCARD QUESTION

Front

When describing malware, what is a difference between a virus and a worm?

Back

A virus replicates itself by attaching to another file, whereas a worm can replicate itself independently.

Answer explanation

Explanation: Malware can be classified as follows:

Virus (self-replicates by attaching to another program or file)

Worm (replicates independently of another program)

Trojan horse (masquerades as a legitimate file or program)

Rootkit (gains privileged access to a machine while concealing itself)

Spyware (collects information from a target system)

Adware (delivers advertisements with or without consent)

Bot (waits for commands from the hacker)

Ransomware (holds a computer system or data captive until payment is received)