Practice Free 100-160 Exam Online Questions
Which of the following best describes the main purpose of malware removal?
- A . To disinfect network devices from malware infections
- B . To secure a system against potential malware attacks
- C . To detect and remove malware that is already present on a system
- D . To prevent malware from being installed on a system
C
Explanation:
Malware removal refers to the process of identifying and eliminating malicious software that has already infected a system. This is essential to prevent further harm and restore the system’s security.
Which of the following elements are part of cybersecurity incident response?
- A . Prevention, Monitoring, Compliance, Remediation
- B . Assessment, Authorization, Authentication, Accounting
- C . Identification, Recovery, Mitigation, Restoration
- D . Detection, Analysis, Containment, Eradication
D
Explanation:
Cybersecurity incident response involves several key elements, including detection, analysis, containment, and eradication. Detection refers to the identification and recognition of a potential cybersecurity incident. Analysis involves examining the incident to understand its nature, impact, and cause. Containment entails taking immediate action to minimize further damage and prevent the incident from spreading. Eradication involves completely removing the threat or vulnerability from the system or network in order to eliminate the possibility of a recurring incident. These elements are crucial for an effective incident response strategy.
Which of the following is the primary objective of vulnerability assessment in cybersecurity?
- A . To determine the likelihood of a vulnerability being exploited.
- B . To identify and remove all vulnerabilities from a system.
- C . To assess the impact of identified vulnerabilities on the system.
- D . To evaluate the effectiveness of existing security controls.
A
Explanation:
The primary objective of vulnerability assessment is to determine the probability of a vulnerability being exploited. It involves identifying and prioritizing vulnerabilities, so resources can be allocated to fix the most critical ones first.
Which of the following is an example of a web application vulnerability that can be exploited by an attacker?
- A . Network latency
- B . Disk fragmentation
- C . Buffer overflow
- D . Cross-site scripting (XSS)
D
Explanation:
Cross-site scripting (XSS) is a web application vulnerability where an attacker injects malicious code into a trusted website, which then executes on the victim’s browser. This vulnerability can allow attackers to steal sensitive information, perform phishing attacks, or deliver malware. Disk fragmentation, network
latency, and buffer overflow are not examples of web application vulnerabilities; they refer to other aspects of computing performance and security.
What is the primary purpose of packet captures in identifying suspicious events in a cybersecurity context?
- A . To backup network configurations and restore them in case of failure.
- B . To monitor network devices and perform vulnerability assessments.
- C . To analyze network traffic and identify potential indicators of compromise.
- D . To encrypt network traffic and secure sensitive information.
C
Explanation:
Packet captures are used to capture and record network traffic, allowing cybersecurity professionals to inspect the packets and analyze the network traffic for potential indicators of compromise (IOCs). By examining the packets, analysts can check for suspicious patterns or anomalies, identify malicious payloads, or detect unauthorized access attempts. Packet captures are a valuable tool in incident response, as they help identify and investigate suspicious events in a network.
Which of the following is a common vulnerability management practice?
- A . Restricting network access based on IP addresses.
- B . Regularly patching software and operating systems.
- C . Encrypting all data at rest in a database.
- D . Installing antivirus software on all company devices.
B
Explanation:
Regularly patching software and operating systems is a common practice in vulnerability management. Software and operating system vendors release security patches and updates to address known vulnerabilities. By regularly applying these patches, organizations can mitigate the risk of exploitation. Failure to patch systems in a timely manner can leave them vulnerable to attacks that exploit known vulnerabilities.
Which of the following is a data protection technique that involves the transformation of data into a format that is unreadable to unauthorized users?
- A . Authentication
- B . Encryption
- C . Firewall
- D . Intrusion Detection System
B
Explanation:
Option 1: Incorrect. Authentication refers to the process of verifying the identity of a user or system.
Option 2: Correct. Encryption is a data protection technique that transforms data into a format that is unreadable to unauthorized users. It provides confidentiality and ensures that even if the data is intercepted, it cannot be easily understood.
Option 3: Incorrect. A firewall is a network security device that monitors and filters incoming and outgoing network traffic based on predetermined security rules.
Option 4: Incorrect. An Intrusion Detection System (IDS) is a security tool that monitors network traffic for suspicious activity or violations of security policies.
Which protocol is used to assign IP addresses to devices on a network?
- A . ICMP
- B . DHCP
- C . UDP
- D . TCP
B
Explanation:
DHCP (Dynamic Host Configuration Protocol) is used to assign IP addresses dynamically to devices on a network. Instead of manually configuring IP addresses on each device, DHCP allows for automated IP address allocation, making network administration more efficient.
Which of the following tools is primarily used for analyzing network packets?
- A . Cisco AnyConnect
- B . Wireshark
- C . Oracle Database
- D . Norton Antivirus
B
Explanation:
Wireshark is a popular open-source tool used for network packet analysis and protocol troubleshooting. It allows users to capture, examine, and analyze network packets in real-time. Wireshark provides detailed information about the different protocols, traffic patterns, and network anomalies, assisting cybersecurity professionals in diagnosing network issues, identifying security vulnerabilities, and detecting potential attacks.
Which of the following is a secure method for sharing sensitive documentation with external parties?
- A . Uploading the documents to a public file-sharing service
- B . Sending the documents via email attachments
- C . Printing the documents and sending them through traditional mail
- D . Using an encrypted communication channel
D
Explanation:
Sending sensitive documentation via email or public file-sharing services presents security risks. It is recommended to use an encrypted communication channel, such as secure file transfer protocol (SFTP) or a secure cloud-based collaboration platform, to protect the confidentiality and integrity of the information being shared.