10) Which of the following statements relates to the exploration of appropriate and ethical behaviors in relation to the online environment and digital media platform? 15) It is an act of theft (such as copying, distributing, modifying, selling) software protected by law. Description: Nowadays, hacking is not only considered an illegal task, as there are also good types of hackers known as ethical hackers. These types of hackers do not hack the system for their own purposes, but the organization hires them to hack their system in order to find security cases, flaws. Once they find the loop or venerable in the system, they are paid and the organization eliminates these vulnerabilities. 10. ___ is the branch of cybersecurity that deals with morality and offers various theories and a principle regarding views on what is right and wrong. a) Social ethics b) Ethics in cybersecurity c) Business ethics d) Ethics in black hat hacking Show answer 7. Before performing a penetration test, aren`t the important points listed below mandatory? a) Know the type of organization b) Characteristics of the work carried out in the enterprise c) System and network d) Type of broadband business used by the enterprise View response 39) The web application such as banking websites should prompt its users to log back in after a certain amount of time, say 30 minutes. Can it be considered an example of what cybersecurity principle? Explanation: The standard built-in security principle of cybersecurity limits how permissions are initiated when a topic or object is created. In cases where permissions, rights, access, or other security-related attributes are not explicitly granted, access to the object should not be granted. 53) In an organization, company or firm, information security guidelines come under__________ explanation: confidentiality, integrity, availability and authenticity These four elements help to understand security and its components.
Explanation: Tails is a type of Linux-based operating system that is considered one of the most secure operating systems in the world. It also offers many features such as anonymity and private browsing options to ensure that users` information is always protected. The main reason why the Tails operating system is famous among users is that it is almost undetectable, which protects your privacy. Explanation: It is usually defined as the software designed to penetrate the target`s device or computer system, collect all information, observe all user activities and send such information to third parties. Another important thing about spyware is that it runs in the background and sends all the information without your permission. ____ is illegal access to the network or computer system. Explanation: DEFCON is one of the most popular and important conferences for hackers and security consultants. It is held once a year in Las Vegas, Nevada, where hackers of all kinds (such as black hats, gray hats, and white hat hackers), government agents, as well as security experts from around the world attend this meeting. 55) To ensure the security of data/information, we must ____ Therefore, the correct answer is C. Explanation: The encryption algorithm is used to create an encrypted message using plain text or “plain text” input and receiving unreadable or “ciphertext” output.
It is usually used to protect information while one place is being transferred to another. 36) For example, suppose an employee requests root access to a UNIX system for which you are the administrator. This right or access should not be granted to the employee unless the employee is employed in a job that requires certain rights and privileges. It can be considered a perfect example of what cybersecurity principle? 14) A person who enters a computer system to gain illegal access to the information stored therein. Explanation: Application security, operational security, network security are the most important and memorable elements of cybersecurity. Therefore, the correct answer is D. 35) Which of the following cybersecurity principles restricts how privileges are initiated when an object or topic is created? Explanation: The example in the above question refers to the principle of least privilege of cybersecurity. The principle of least privilege of cybersecurity states that none of the organization`s employees should be granted rights unless they need these special rights to perform the task at hand. In short, we can say that its main task is to limit or control the transfer of rights to employees. 9) The symbol usually precedes a statement, All rights reserved, indicating that the material and information are protected (protected by copyright) and are the exclusive property of the owner.
8. An ethical hacker must ensure that the company`s proprietary information does not leak. a) True b) False view Explanation of response: The comprehensive principle of cybersecurity mediation requires that all access be verified to ensure that it is actually authorized. However, the example given in the above question can be considered as an example of full mediation. Cyberstalking is a type of cybercrime in which one person (or victim) is continuously tracked electronically by another person or a group of several people in order to harass the victim. We can also say that the main purpose of harassment is to observe or monitor the actions of each victim in order to obtain the essential information that can be used for threats, harassment, etc. Explanation: Encryption techniques are generally used to improve network security. The correct answer is therefore A. 12) The security provided to protect a network from unauthorized access and risk.
Explanation: Confidentiality, integrity, availability are the three main principles. In short, these three principles are also known as the CIA Triad and play an important role as the cornerstone of any organization`s security structure. 34) Which of the following cybersecurity principles refers to the need for the security mechanism to be as small and simple as possible? Explanation: Malware is a type of short program used by the hacker to gain access to sensitive data/information. It is used to refer to many types of viruses, worms, Trojans, and various other malicious programs. Sometimes malware is also referred to as malware. Explanation: In terms of email security, phishing is one of the standard methods used by hackers to gain access to a network. Email security tools can handle different types of attacks, such as inbound attacks, and also protect outbound messages with sensitive data/information. Explanation: The scheme of the mechanism stipulates that the security mechanism should be as simple and small as possible. 2) These are the rights of the owner of the information to decide how much information to exchange, share or distribute. 11) A network security system that manages and regulates network traffic according to certain protocols. 13) This is a keyword or secret used to protect your information from unauthorized access. 2.
Riding on the shoulder to check someone else`s password is _____ a) a good b) not so good c) a very good social engineering practice d) a bad view answer 56) which of the following is considered the most secure Linux operating system that also offers anonymity and incognito option to secure user information? Explanation: In general, hackers use computer viruses to perform various tasks, such as corrupting the user`s data stored in their system, accessing important information, monitoring or logging each user`s moves. Therefore, the correct answer is D. 12. A penetration tester should identify and consider an organization`s _____ and ____ requirements when assessing security posture. a) Privacy and security b) Rules and regulations c) Hacking techniques d) Ethics for talking to older adults Show answer 40) Which of the following statements is correct about email security in network security methods? In some cases, hacking into a computer or network may be legal. Explanation: The term VPN stands for Virtual Private Network. It is a kind of network security enhancement tool that can be either software or a hardware device. It typically authenticates communication between a device and a network by creating a secure encrypted virtual “tunnel.” In general, software VPNs are considered the most cost-effective and user-friendly compared to hardware VPNs. 4) Which of the following usually observes all of the victim`s activities on the Internet, collects all the information in the background and sends it to someone else? 15) In the field of ethical hacking and cybersecurity, there is _____ This is a type of cyberattack in which one tries to make a machine (or a target application, a website, etc.) unavailable to its intended users. This is usually achieved by temporarily or indefinitely disrupting the Internet-connected destination.
20) In order to protect the computer system from hackers and various types of viruses, one should always leave ____ enabled in the computer system. 14) Which of the following port and IP address scanners is known to users?. 59) Which of the following techniques are known as the oldest phone hacking techniques used by hackers to make free calls? Explanation: Open design is a kind of open design artifact whose documentation is publicly available, meaning that anyone can use, study, modify, distribute, and create the prototypes.