Tools & Techniques for Cybersecurity Chapter Exam

Exam Instructions:

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Page 1

Question 1 1. This barrier helps protect your network from intrusion in both incoming and outgoing traffic:

Question 2 2. Anti-virus software can find and remove _____ from your computer system.

Question 3 3. This piece of software backs up a firewall and can alert your IT team to possible attacks.

Question 4 4. What is the purpose of email encryption software?

Question 5 5. What does ransomware software protect your system from?

Page 2

Question 6 6. Examine the following scan results. What port and service is the Apache HTTPD application running?

Question 7 7. The PING of Death is also called which of the following attacks?

Question 8 8. Which of the following tools can be used to scan a network for network discovery and security auditing

Question 9 9. The LOphtCrack password recovery and auditing tool is capable of cracking the algorithm for which of the following?

Question 10 10. Which of the following is NOT TRUE about LOphtCrack?

Page 3

Question 11 11. What is an IDS?

Question 12 12. Which of these is used to detect cybercrime?

Question 13 13. Which method works like an antivirus program?

Question 14 14. Which tool looks for abnormal activity?

Question 15 15. What is meant by the term cybercrime?

Page 4

Question 16 16. Which of the below answers is not a common type of cybercrime discussed in the lesson?

Question 17 17. _____ can affect both individuals and companies regardless of size, industry, or value for the purpose of performing malicious acts.

Question 18 18. Which phase below describes the process of ensuring operations have returned to a secure normal state?

Question 19 19. A _____ is responsible for dealing with cybercrime events.

Question 20 20. _____ is a tool used for examining the contents of a device in a secure manner?

Tools & Techniques for Cybersecurity Chapter Exam Instructions

Choose your answers to the questions and click 'Next' to see the next set of questions. You can skip questions if you would like and come back to them later with the yellow "Go To First Skipped Question" button. When you have completed the practice exam, a green submit button will appear. Click it to see your results. Good luck!

Computer Science 110: Introduction to Cybersecurity  /  Computer Science Courses
Support