Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
34 views5 pages

Info ASS Mid

The document covers various aspects of cybersecurity, including encryption types, security appliances, and best practices for protecting personal data. It discusses multiple choice questions related to network security, firewalls, and the importance of behavior-based security. Additionally, it highlights the role of Cisco's Computer Security Incident Response Team in managing security incidents.

Uploaded by

Jojo Bugarin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
34 views5 pages

Info ASS Mid

The document covers various aspects of cybersecurity, including encryption types, security appliances, and best practices for protecting personal data. It discusses multiple choice questions related to network security, firewalls, and the importance of behavior-based security. Additionally, it highlights the role of Cisco's Computer Security Incident Response Team in managing security incidents.

Uploaded by

Jojo Bugarin
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

I.

Multiple Choice
1. It works by scrambling the data in a message so that only the intended recipients can read
it. And considered as the best way to keep your personal data safe.

Encryption

There are two most common types of encryption used in Wi-Fi networks and Bluetooth
connections. Which type is the least secured?

WEP

3. The networking standard used by wireless architecture, which implements OFDM


technology used in 802.11a in the 2.4GHz band.

802.11g

4. It refers to the process of converting information into a form in which unauthorized parties
cannot read it.

Encryption

5. It helps safeguard your device by filtering network traffic and blocking unauthorized
access. It reduces the risk of network security threats by restricting or allowing traffic based
on various properties such as IP addresses, ports, or program paths.

Windows Firewall

6. Malicious software, such as viruses and spyware, are designed to gain unauthorized access
to your computer and your data. To prevent this, you should...

Install antivirus and antispyware.

7. It refers to a vulnerability where attackers break the encryption between a wireless router
and a wireless device, giving them access to network data.

KRACK

8. Hackers are always trying to take advantage of vulnerabilities that may exist in your
operating system or web browser. Therefore, to protect your computer and your data, you
should....

Manage your operating system and browser

9. It refers to an open standard protocol that allows you to use your credentials to access
third-party applications without exposing your password.

Open authorization (OAuth)


10. Email and Web Browser Privacy problems can be minimized by enabling the In-private
browsing mode on your web browser. What is the most commonly used by Mozilla Firefox
browser for private browser mode:

Private tab or private window

11. When Posting something online that contains your address combined with a recent photo
of you on holiday could be an invitation for:

criminals to target your house.

12. Which of the following do you think poses a risk if posted on social media?

Photo while on vacation with some details..

13. Email and Web Browser Privacy problems can be minimized by enabling the in-private
browsing mode on your web browser. What is the most commonly used by Safari browser for
private browser mode:

Private browsing

14. @Apollo's Sales Manager is traveling to meet a client. She forgot to download the
contract from @Apollo's server to bring to the meeting with her. The train has an open Wi-Fi
network. She contacts you to ask what she should do. What would you advise?

She should access the train's open Wi-Fi network and connect to the @Apollo servers
using the VPN connection on her work laptop.

15. It refers to a Windows feature that can encrypt data and is directly linked to a specific
user account and only the user that encrypts the data will be able to access it after it has been
encrypted.

EFS

16. One of the benefits of using this storage service is that your data is safe in the event of a
storage device failure or if you experience an extreme situation such as a fire or theft.

Cloud Storage service

17. To erase data so that it is no longer recoverable, it must be overwritten with ones and
zeroes multiple times, using a tool from Microsoft known as:

Shred

18. You have just signed a Terms of Service Agreement. Which among the following
statements best describes a Terms of Service Agreement.

A legally binding contract that governs the rules of the relationship between you, the
service provider and others who use the service.
19. It refers to a section in the Terms of Service which outlines how the service provider will
collect, use and share your data.

Data user policy

20. Popular online services, such as Google, Facebook, Twitter, Linkedin, Apple and
Microsoft, use authentication techniques to add an extra layer of security for account logins.

2FA

II. Identification
Scenario for Questions 1-4: You ask the Chief Technology Officer (CTO), who explains
that the following security appliances are in place. Can you identify which category each of
these falls into?

1. Cisco's AnyConnect Secure Mobility Client empowers remote workers with highly secure
access to @Apollo's network from any device, at any time, in any location.

VPN (Virtual Private Network)

2. Cisco's AMP provides next-generation endpoint protection, scanning and constantly


monitoring files for malicious behavior.

Antimalware

3. Cisco's ISR 4000 provides routing, filtering and encryption in a single platform.

Router

4. Cisco's Firepower 4100 Series shows what's happening on the network so that you can act
faster in the face of a cyber attack.

Firewall

5. Filters communications based on source and destination data ports, as well as connection
states.

Transport layer firewall

6. Filters communications based on an application, program or service.

Application layer firewall

7. Filters communications based on the user, device, role, application type and threat profile.

Context aware layer firewall

8. Filters web content requests like URLs, domain names and media types.
Proxy server

9. It refer to systems which use a set of traffic signature that match and block malicious
traffic and attacks.

IPS (Intrusion prevention system)

10. It refer to systems which allows remote employees use a secure encrypted tunnel from
their mobile computer and securely connect back to the organization's network.

VPN

11. These systems use signatures or behavioral analysis of applications to identify and block
malicious code from being executed.

Antimalware or Antivirus

12. This filters communications based on source and destination IP addresses.

Network layer firewall

13. Placed in front of web servers, reverse proxy servers protect, hide, offload and distribute
access to web servers.

Reverse proxy server

14. This firewall hides or masquerades the private addresses of network hosts.

NAT firewall (Network Address Translation)

15. Filters ports and system service calls on a single computer operating system

Host-based firewall

Scenario for Questions 16-18: The CTO forgot to mention that @Apollo has a few firewalls
in place. Based on the following statements, can you identify what category of firewall these
are?

16. Employees using computers on the network are not permitted access to specific URLs,
such as gambling sites.

Proxy server

17. It considered as one of the biggest attack threats requiring real-time detection and
response.

DDoS

18. It refers to the unit that has access to forensically sound information from which it can
more quickly analyze and understand suspicious behaviors.
Incidence Response team

19. A small, internal local area network with computers requires access to the Internet using a
single Internet connection.

NAT firewall

20. By default, Windows tries to block access to applications running on Windows PCs from
other computers in the network.

Host-based firewall

III. Discussion
1. What is Behavior-Based Security?
- Behavior-Based Security is a form of threat detection that involves
capturing and analyzing the flow of communication between a user on the
local network and a local or remote destination. Any changes in normal
patterns of behavior are regarded as anomalies, and may indicate an
attack.
2. What is Cisco's Computer Security Incident Response Team (CSIRT)?
- To receive, review and respond to computer security incident reports.
Cisco CSIRT goes a step further and provides proactive threat assessment,
mitigation planning, incident trend analysis and security architecture
review in an effort to prevent security incidents from happening.

You might also like