Tuesday, May 25, 2021

Cyber Awareness Pretest Answers


  • Changing locks to ensure key control. Having good relations with neighbors and looking out for each other. Question True or False: Active resistance should be the immediate response to an active shooter incident.
    Link: https://bakersfieldhottubsplus.com/hot-tubs/cal-spas/inground-spas/


  • SEC starts by instilling familiarity with core security terms and principles. By the time you leave the classroom after the first day, you fully understand the Principle of Least Privilege and why it drives all security decisions. Exercises Lab -...
    Link: https://hgtc.edu/documents/admissions/testing/rpnow-user.pdf
  • NOTE: We do not give time in class for watching the videos or completing the quizzes. These are extra, outside of class activities. If you believe you may like to view the videos during class time perhaps during a break , please bring ear-buds or headphones so that you do not distract other students with the audio. Lab - Building Better Passwords: We'll use a tool that shows how long it takes to compromise various passwords via a brute force attack. The emphasis of the lab is how to help yourself, your users, your family, and your friends to choose better, stronger, and easier to use passwords.
    Link: https://thoughtco.com/the-storm-741514
  • Every attack uses something that exists for perfectly valid reasons and misuses it in invalid malicious ways. To work in cyber security, you have to understand the valid functions to understand the potential for invalid misuse. The day begins with a discussion of how computers work. We cover the numbering system of decimal, binary, and hexadecimal - vital to understanding computers and networks. We also discuss what an operating system is. We talk about the terms kilobyte, megabyte, gigabyte, and terabyte and what those terms mean. In short, how a computer works. From there, we move to a discussion of how information moves from point A to point B across a network without using any technical terminology of any kind. As we move on through the day, we slowly add the technical aspects of those explanations, including the terms and acronyms of networking.
    Link: https://quizlet.com/455169228/sssm-2000-exam-3-flash-cards/
  • We discuss the origins of the Internet and why that origin matters to modern-day cyber security. You learn about standard network hardware such as a network interface card, a switch, and a router. We progress to topics such as IP addresses, network masks, default gateways, and routing. While the above description sounds exceptionally technical, rest assured that we present the material in the most non-technical way possible. We cover each topic at a very high-level without getting into the nitty-gritty details. Exercises Lab - Computer Number Conversions: Apply the knowledge you learned to convert decimal numbers to binary, binary numbers to hexadecimal, binary and hexadecimal numbers to decimal values, and so on. You will also perform simple network packet analysis with the Wireshark tool. It is not a topic you can explain in passing; we spend a full day on it. You do not need a calculator for this day since we do not delve into the math behind crypto.
    Link: https://gtgtechnologygroup.com/california-trucking-association-combats-state-contractor-test/
  • We introduce you to cryptographic terms. We explain what steganography is. We then look at historical examples of cryptography. We do this because even the most advanced cryptographic systems today utilize methods of encrypting data that were used hundreds of years B. So we explain the historical examples that are very easy to understand to make it easier to understand modern cryptographic methods and principles. We cover the "work factor" - the length of time necessary to break cryptography and why understanding this concept is so important. We cover some of the potential attacks against crypto and which ones are viable against modern cryptography and which attacks are nonviable. We then show real-world examples of how those cryptographic systems work. We cover the secure key exchange mechanism called Diffie-Hellman. Once we have thoroughly explained how cryptography works, we end the day with a discussion of data encrypting protocols.
    Link: https://proprofs.com/quiz-school/story.php?title=Njk4MjQx2V5O
  • Things that use cryptography to secure data on our networks and across the Internet. Here we cover email encryption, secure remote administration, secure file transfer, and three examples of Virtual Private Networks VPNs. Again, we do not spend our time on the mathematics behind cryptography, but instead, we are highly process focused. We explain the steps required to make crypto work, the order those steps must occur in, and which key you must use for each step. Exercises Lab - Crypto by Hand: Apply the knowledge and skills you've learned to encrypt information using mono and poly alphabetic ciphers and gain a better understanding of triple encryption as used by Triple DES. Lab - Visual Crypto: Observe the encryption process that occurs by turning plaintext what you can read into ciphertext what you cannot read in real-time. Increase your understanding of what "randomness in ciphertext" truly means.
    Link: https://codegolf.stackexchange.com/questions/150117/boustrophedonise
  • See ciphertext turned back into plaintext. Find out what happens if you edit cyphertext and try to decrypt it. Learn what happens if you attempt to decrypt data with the wrong key. The lab provides visual proof of many definitive statements made by the instructor throughout the lecture. We begin with wireless network security WiFi and Bluetooth , and mobile device security i. We compare and contrast the security models of Apple's iPhone and Google's Android phones. We also discuss the almost total lack of security in the Internet of Things IoT.
    Link: https://edwardsmaths.com/download/grade-12-nsc-fen-mar-2018-exam-memo-p2/
  • We follow that with a look at some frequent attacks, including open-source intelligence gathering, social engineering, drive-by download attacks, watering hole attacks, buffer overflow attacks, Denial of Service DoS , and other frequent attacks. We then move into a discussion of malware. What is a virus versus a worm or a trojan horse? What is ransomware, and what is cryptojacking. We then cover both anti-malware and host firewalls that try to counter these problems. Wireless Router. Students go through the steps of configuring a wireless access point from its default insecure state to a locked-down, far more secure state. Industry best practices dictate the final settings. Students can take these lab instructions home or to work and apply them with some necessary modifications given their device manufacturer. Lab - Run the anti-malware scanner "Malwarebytes" on a virtual machine running within the lab environment.
    Link: https://laboratoryinfo.com/rdw-blood-test/
  • Discover active malware and remove it from the system. Whitelist the PUPs, so they stop showing up in the scan results. We then take a solid look at Browser and Web security, and the difficulties of securing the web environment. We end the day with a look at system security to include hardening operating systems, patching, virtual machines, cloud computing, and backup. We include solid real-world examples of how to implement these. Students utilize an open-source tool called "Firewall Builder" to create a simple yet fully functional firewall configuration. The lab not only explains how to build each of the rules but, more importantly, explains WHY you build each rule. The lab teaches not only the basics of configuring a firewall but also how to read and audit an existing firewall ruleset.
    Link: https://nbmeanswers.com/exam/nbme21/768?error=You+must+be+logged+in+to+vote%21
  • GISF certification holders will be able to demonstrate key concepts of information security including: understanding the threats and risks to information and information resources, identifying best practices that can be used to protect them, and learning to diversify our protection strategy. Cyber security terminology The basics of computer networks Security policies.
    Link: https://meetuniversity.com/blog/ssc-chsl-102-answer-key-2015-for-1-november-ldc-deo-exam/
  • This article will provide you with all the questions and answers for Cyber Awareness Challenge. ActiveX is a type of this? How many potential insider threat indicators is Bob displaying? What should you do? You are reviewing your employees annual self evaluation. Your comments are due on Monday. You can email your employees information to yourself so you can work on it this weekend and go home now. Which method would be the BEST way to send this information? Before long she has also purchased shoes from several other websites. What can be used to track Maria's web browsing habits? What security device is used in email to verify the identity of sender? Which of the following is NOT one? All https sites are legitimate. Which of the following is NOT a social engineering tip? The email has an attachment whose name contains the word "secret".
    Link: https://nz.answers.yahoo.com/question/index?qid=20091030153853AAlhKqw
  • Disabling cookies What level of damage to national security could reasonably be expected if unauthorized disclosure of Top Secret information occurred? Exceptionally grave damage Which of the following is true about telework? Which of following is true of protecting classified data? New interest in learning another language? A colleague has visited several foreign countries recently, has adequate work quality, speaks openly of unhappiness with U. How many indicators does this employee display? What would you do if you receive a game application request on your government computer that includes permission to access your friends, profile information, cookies, and sites visited? What information most likely presents a security risk on your personal social networking profile?
    Link: https://answers.com/Q/What_are_the_answers_to_AF_SABC_exam
  • As a security best practice, what should you do before exiting? Which of the following is a best practice for handling cookies? You receive an unexpected email from a friend: "I think you'll like this: URL " What action should you take? The email provides a link to a personnel portal where you must enter your personal information as part of an effort to standardize recordkeeping. What action should you take first? What is TRUE of a phishing attack? Upon connecting your Government-issued laptop to a public wireless connection, what should you immediately do? A coworker has asked if you want to download a programmer's game to play at work. What should be your response? A coworker wants to send you a sensitive document to review while you are at lunch and you only have your personal tablet.
    Link: https://eml.berkeley.edu/~saez/course/exam230B_20.pdf
  • Which of the following demonstrates proper protection of mobile devices? How can you protect your information when using wireless technology? Which of the following is NOT true of traveling overseas with a mobile phone Physical security of mobile phones carried overseas is not a major issue Which of the following is NOT true of traveling overseas with a mobile phone Physical security of mobile phones carried overseas is not a major issue Which of the following is NOT true of traveling overseas with a mobile phone Physical security of mobile phones carried overseas is not a major issue.
    Link: https://coursehero.com/file/87274767/01-SE-Homework-01pdf/
  • Antiterrorism Scenario Training, Page 2 True True or False: In the event of a skyjacking, you should immediately attempt to subdue the skyjackers. True or False? Antiterrorism Scenario Training, Page 2 True Home security can be improved with self-help measures like changing locks, securing windows, and improving outdoor lighting. Antiterrorism Scenario Training, Page 2 True True or False: The initial moments of a hostage-taking incident can be extremely dangerous. Antiterrorism Scenario Training, Page 1 True True or False: In an active shooter incident involving firearms you should immediately lie on the ground. Antiterrorism Scenario Training, Page 2 False True or False: From a security perspective, the best rooms are directly next to emergency exits. Antiterrorism Scenario Training, Page 3 False From the following choices, select the factors you should consider to understand the threat in your environment.
    Link: https://files.eric.ed.gov/fulltext/ED254717.pdf
  • Introduction to Antiterrorism, Page 3 Do terrorist groups attack Americans? Are terrorist groups in the area? Are terrorist groups violent? What tactics and weapons are used by terrorist groups? Will local citizens warn Americans about terrorist groups? Are terrorist groups predictable? How sophisticated are terrorist groups? How active are terrorist groups? IEDs may come in many forms and may be camouflaged to blend in to the surrounding environment.
    Link: https://gzfkb.easypalermo.it/traccar-eclipse.html
  • Antiterrorism Scenario Training, Page 6 True True or False: Active resistance should be the immediate response to an active shooter incident. Antiterrorism Scenario Training, Page 1 False Knowing indicators of an unstable person can allow you to identify a potential insider threat before an incident. Antiterrorism Scenario Training, Page 4 True Select all factors that are ways in which you might become the victim of a terrorist attack. Antiterrorism Scenario Training, Page 2 A person expressing boredom with the US mission The ticketing area is more secure than the area beyond the security check point.
    Link: https://123doc.net/document/398476-test-yourself-c-grade-12.htm
  • Antiterrorism Scenario Training, Page 3 False Surveillance can be performed through either stationary or mobile means. Antiterrorism Scenario Training, Page 3 A reasonable disagreement with a US Government policy If you identify a possible surveillance attempt you should try to handle the situation yourself. Antiterrorism Scenario Training, Page 3 Breaking and entering to steal valuables Internet acquaintances can pose a security threat and should be carefully monitored. Antiterrorism Scenario Training, Page 5 True Which one of these is a possible indicator of a suspicious letter or package? Introduction to Antiterrorism, Page 10 The most increased level of protection Everyone on an installation has shared responsibility for security.
    Link: https://wayfair.com/lighting/pdp/heath-zenith-motion-activated-outdoor-security-flood-light-with-motion-sensor-heh1122.html
  • Antiterrorism Scenario Training, Page 2 Hiding a key outside to ensure family members can get in if they lose their keys Which of the following is NOT a useful vehicle feature from a security perspective? Air bags Which of the following is NOT a recommended response to an active shooter incident? Provide instructions to arriving emergency response personnel Anti Terrorism Level 1 Post Test Answers From the following choices, select the factor you should consider to understand the threat in your environment.
    Link: http://ibse.hk/MEBS6006/whatsnew0910.htm
  • Introduction to Antiterrorism, Page 3 How sophisticated are terrorist groups? All are correct All are correct Select the factor that will NOT help you avoid becoming the victim of a terrorist attack. Introduction to Antiterrorism, Page 4 Predictability.
    Link: https://academia.edu/15919174/Understanding_Refractory_API_936_ICP
  • Bad actors often use times of fear, uncertainty, and doubt to further their efforts to compromise businesses and individuals for nefarious reasons. Cybercriminals sent out 1. Now more than ever with many new remote workers, it is important to have employee security awareness training and protect your business. Security training for employees can help to close up that gap and make your employees your biggest strength, which is why it is so important to incorporate training into your security program. Educating your employees will not only reduce your risk but could save you money in the long run.
    Link: https://coursehero.com/file/7548224/SOC-3040-Exam-1-Study-Guide/

No comments:

Post a Comment

Preferred Freelancer Program Sla Exam Answers 2021

[GET] Preferred Freelancer Program Sla Exam Answers 2021 | HOT! We provide excellent services, engagement, and advanced materials that empo...