FBLA Cyber Security Exam Questions with Correct Answers
2 views 0 purchase
Course
FBLA Cyber Security
Institution
FBLA Cyber Security
FBLA Cyber Security Exam Questions with Correct Answers
Countermeasures - Answer- Action, device, procedure, technique or other measure that reduces the vulnerability of an information system.
Data Driven Attack - Answer- A form of attack that is encoded in seemingly innocuous data which is ...
FBLA Cyber Security Exam
Questions with Correct
Answers
Countermeasures - Answer- Action, device, procedure, technique or other measure that
reduces the vulnerability of an information system.
Data Driven Attack - Answer- A form of attack that is encoded in seemingly innocuous
data which is executed by a user or a process to implement an attack; concern for
firewalls, since it may get through the firewall in data form and launch an attack against
a system behind the firewall.
Data Integrity - Answer- The state that exists when automated data is the same as that
in source documents, or has been correctly computed from source data, and has not
been exposed to alteration or destruction.
Denial of Service - Answer- Result of any action or series of actions that prevents any
part of an information system from functioning.
Dial-Up - Answer- The service whereby a computer terminal can use the telephone to
initiate and effect communication with a computer.
Dictionary Attack - Answer- An attack that uses a brute-force technique of successively
trying all the words in some large, exhaustive list.
Digital Signature - Answer- A way to verify that an email message is really from the
person who supposedly sent it and that it hasn't been changed. You may have received
emails that have a block of letters and numbers at the bottom of the message- this
mathematical algorithm is used to combine the information in a key with the information
in the message. The result is a random-looking string of letters and numbers.
Distributed Tool - Answer- A tool that can be distributed to multiple hosts, which can
then be coordinated to anonymously perform an attack on the target host
simultaneously after some time delay.
, DNS Spoofing - Answer- Assuming the name of another system by either corrupting the
name service cache of a victim system, or by compromising a domain name server for a
valid domain.
DSL - Answer- Digital Subscriber Line Internet connectivity, unlike cable modem-based
service, provides the user with dedicated bandwidth. However, the maximum bandwidth
available to is usually lower than the maximum cable modem rate because of
differences in their respective network technologies. Also, the "dedicated bandwidth" is
only dedicated between your home and the provider's central office -- the providers offer
little or no guarantee of bandwidth all the way across the Internet.
Encryption - Answer- The translation of data into a secret code; the most effective way
to achieve data security. To read these files, you must have access to a secret key or
password that enables you to decrypt it.
EULA - Answer- A contract between you and the software's vendor or developer. Some
software packages state that you agree to the contract by removing the shrink-wrap on
the package. However, you may be more familiar with the type of this that is presented
as a dialog box that appears the first time you open the software. It usually requires you
to accept the conditions of the contract before you can proceed.
Firewall - Answer- A system designed to prevent unauthorized access to or from a
private network; can be implemented in both hardware and software, or a combination
of both; frequently used to prevent unauthorized Internet users from accessing private
networks connected to the Internet, especially intranets. All messages entering or
leaving the intranet pass through this, which examines each message and blocks those
that do not meet the specified security criteria.
Flooding - Answer- Type of incident involving insertion of a large volume of data
resulting in denial of service.
Gateway - Answer- A bridge between two networks.
Hacker - Answer- Unauthorized user who attempts to or gains access to an information
system.
Internet - Answer- A global network connecting millions of computers; has more than
200 million users worldwide, and that number is growing rapidly.
Intranet - Answer- A network based on an internet belonging to an organization, usually
a corporation, accessible only by the organization's members, employees, or others with
authorization. Its Web sites look and act just like any other Web sites, but the firewall
surrounding it fends off unauthorized access.
Intrusion - Answer- Unauthorized act of bypassing the security mechanisms of a
system.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Scholarsstudyguide. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $13.49. You're not tied to anything after your purchase.