Google Cybersecurity Certification Final Exam Questions With Solved Solutions.
1 view 0 purchase
Course
Information Security Professional Certifications
Institution
Information Security Professional Certifications
Absolute file path - Answer The full file path, which starts from the root
Access controls - Answer Security controls that manage access, authorization, and accountability of information
Active packet sniffing - Answer A type of attack where data packets are manipulated in transit
...
Google Cybersecurity Certification Final
Exam Questions With Solved Solutions.
Absolute file path - Answer The full file path, which starts from the root
Access controls - Answer Security controls that manage access, authorization, and accountability of
information
Active packet sniffing - Answer A type of attack where data packets are manipulated in transit
Address Resolution Protocol (ARP) - Answer A network protocol used to determine the MAC address of
the next router or device on the path
Advanced persistent threat (APT) - Answer An instance when a threat actor maintains unauthorized
access to a system for an extended period of time
Adversarial artificial intelligence (AI) - Answer A technique that manipulates artificial intelligence (AI)
and machine learning (ML) technology to conduct attacks more efficiently
Adware - Answer A type of legitimate software that is sometimes used to display digital advertisements
in applications
Algorithm - Answer A set of rules used to solve a problem
Analysis - Answer The investigation and validation of alerts
Angler phishing - Answer A technique where attackers impersonate customer service representatives
on social media
Anomaly-based analysis - Answer A detection method that identifies abnormal behavior
,Antivirus software - Answer A software program used to prevent, detect, and eliminate malware and
viruses
Application - Answer A program that performs a specific task
Application programming interface (API) token - Answer A small block of encrypted code that contains
information about a user
Argument (Linux) - Answer Specific information needed by a command
Argument (Python) - Answer The data brought into a function when it is called
Array - Answer A data type that stores data in a comma-separated ordered list
Assess - Answer The fifth step of the NIST RMF that means to determine if established controls are
implemented correctly
Asset - Answer An item perceived as having value to an organization
Asset classification - Answer The practice of labeling assets based on sensitivity and importance to an
organization
Asset inventory - Answer A catalog of assets that need to be protected
Asset management - Answer The process of tracking assets and the risks that affect them
Asymmetric encryption - Answer The use of a public and private key pair for encryption and decryption
of data
,Attack surface - Answer All the potential vulnerabilities that a threat actor could exploit
Attack tree - Answer A diagram that maps threats to assets
Attack vectors - Answer The pathways attackers use to penetrate security defenses
Authentication - Answer The process of verifying who someone is
Authorization - Answer The concept of granting access to specific resources in a system
Authorize - Answer The sixth step of the NIST RMF that refers to being accountable for the security and
privacy risks that might exist in an organization
Automation - Answer The use of technology to reduce human and manual effort to perform common
and repetitive tasks
Availability - Answer The idea that data is accessible to those who are authorized to access it
Baiting - Answer A social engineering tactic that tempts people into compromising their security
Bandwidth - Answer The maximum data transmission capacity over a network, measured by bits per
second
Baseline configuration (baseline image) - Answer A documented set of specifications within a system
that is used as a basis for future builds, releases, and updates
Bash - Answer The default shell in most Linux distributions
Basic auth - Answer The technology used to establish a user's request to access a server
, Basic Input/Output System (BIOS) - Answer A microchip that contains loading instructions for the
computer and is prevalent in older systems
Biometrics - Answer The unique physical characteristics that can be used to verify a person's identity
Bit - Answer The smallest unit of data measurement on a computer
Boolean data - Answer Data that can only be one of two values: either True or False
Bootloader - Answer A software program that boots the operating system
Botnet - Answer A collection of computers infected by malware that are under the control of a single
threat actor, known as the "bot-herder"
Bracket notation - Answer The indices placed in square brackets
Broken chain of custody - Answer Inconsistencies in the collection and logging of evidence in the chain
of custody
Brute force attack - Answer The trial and error process of discovering private information
Bug bounty - Answer Programs that encourage freelance hackers to find and report vulnerabilities
Built-in function - Answer A function that exists within Python and can be called directly
Business continuity - Answer An organization's ability to maintain their everyday productivity by
establishing risk disaster recovery plans
Business continuity plan (BCP) - Answer A document that outlines the procedures to sustain business
operations during and after a significant disruption
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller TestSolver9. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $10.29. You're not tied to anything after your purchase.