
CCST Cyber Flashcard Test #1

Flashcard
•
Information Technology (IT)
•
9th Grade
•
Hard
Quizizz Content
FREE Resource
Student preview

8 questions
Show all answers
1.
FLASHCARD QUESTION
Front
A medical office employee sends emails to patients about their recent visits to the facility. What information would put the privacy of the patients at risk if it was included in the email?
Back
Patient records
Answer explanation
Explanation: An email message is transmitted in plain text and can be read by anyone who has access to the data while it is en route to a destination. Patient records include confidential or sensitive information that should be transmitted in a secure manner.
2.
FLASHCARD QUESTION
Front
What is the best way to avoid getting spyware on a machine? Options: Install the latest antivirus updates, Install the latest web browser updates, Install software only from trusted websites, Install the latest operating system updates
Back
Install software only from trusted websites
3.
FLASHCARD QUESTION
Front
Which certification meets the U.S. Department of Defense Directive 8570.01-M requirements for IT security in the federal government? Options: ISC2 Certified Information Systems Security Professional, ISACA CSX Cybersecurity Fundamentals, Microsoft Technology Associate Security Fundamentals, EC Council Certified Ethical Hacker, CompTIA Security+
Back
CompTIA Security+
Answer explanation
Explanation: This is an entry-level security certification that meets the U.S. Department of Defense Directive 8570.01-M requirements, which is an important item for anyone looking to work in IT security for the federal government.
4.
FLASHCARD QUESTION
Front
Which certification tests your understanding and knowledge in how to look for weaknesses and vulnerabilities in target systems using the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner? Options: EC Council Certified Ethical Hacker, Palo Alto Networks Certified Cybersecurity Associate, ISC2 Certified Information Systems Security Professional, Microsoft Technology Associate Security Fundamentals, CompTIA Security+
Back
EC Council Certified Ethical Hacker
Answer explanation
Explanation: This certification tests your understanding and knowledge of how to look for weaknesses and vulnerabilities in target systems using the same knowledge and tools as a malicious hacker but in a lawful and legitimate manne
5.
FLASHCARD QUESTION
Front
If developers attempt to create their own security algorithms, it will likely introduce what type of vulnerabilities?
Back
Weaknesses in security practices
Answer explanation
Explanation: Systems and sensitive data can be protected through techniques such as authentication, authorization and encryption. Developers should stick to using security techniques and libraries that have already been created, tested and verified and should not attempt to create their own security algorithms. These will only likely introduce new vulnerabilities.
6.
FLASHCARD QUESTION
Front
Which of the following firewalls filters traffic based on source and destination IP addresses? Network layer firewall, Proxy server, Application layer firewall
Back
Network layer firewall
7.
FLASHCARD QUESTION
Front
Which of the following firewalls filters web content requests such as URLs and domain names? Application layer firewall, Proxy server, Reverse proxy server, Network layer firewall, Network address translation firewall
Back
Proxy server
8.
FLASHCARD QUESTION
Front
When describing malware, what is a difference between a virus and a worm?
Back
A virus replicates itself by attaching to another file, whereas a worm can replicate itself independently.
Answer explanation
Explanation: Malware can be classified as follows:
Virus (self-replicates by attaching to another program or file)
Worm (replicates independently of another program)
Trojan horse (masquerades as a legitimate file or program)
Rootkit (gains privileged access to a machine while concealing itself)
Spyware (collects information from a target system)
Adware (delivers advertisements with or without consent)
Bot (waits for commands from the hacker)
Ransomware (holds a computer system or data captive until payment is received)
Similar Resources on Wayground
10 questions
roblox

Flashcard
•
KG
10 questions
W.63: Proxy Wars

Flashcard
•
9th Grade
8 questions
Population

Flashcard
•
9th Grade
8 questions
Cybersecurity Fundamentals Flashcard CCST #1

Flashcard
•
9th - 12th Grade
10 questions
Cyber Security Careers

Flashcard
•
8th Grade
5 questions
APPLICATION SOFTWARE

Flashcard
•
9th Grade
9 questions
Bezpieczeństwo w sieci

Flashcard
•
KG
11 questions
Healthcare Occupations Flashcard

Flashcard
•
9th Grade
Popular Resources on Wayground
11 questions
Hallway & Bathroom Expectations

Quiz
•
6th - 8th Grade
20 questions
PBIS-HGMS

Quiz
•
6th - 8th Grade
10 questions
"LAST STOP ON MARKET STREET" Vocabulary Quiz

Quiz
•
3rd Grade
19 questions
Fractions to Decimals and Decimals to Fractions

Quiz
•
6th Grade
16 questions
Logic and Venn Diagrams

Quiz
•
12th Grade
15 questions
Compare and Order Decimals

Quiz
•
4th - 5th Grade
20 questions
Simplifying Fractions

Quiz
•
6th Grade
20 questions
Multiplication facts 1-12

Quiz
•
2nd - 3rd Grade