Cybersecurity (Oregon) Exam 2023 with complete
solution
What is the primary goal of cybersecurity?
CORRECT ANSWER - The primary goal of cybersecurity is to protect sensitive information, systems, and
networks from unauthorized access, use, disclosure, disruption, modification, or destruction.
What is a common method used by cybercriminals to gain access to sensitive information?
CORRECT ANSWER - Phishing is a common method used by cybercriminals to gain access to sensitive
information. This is done by sending fraudulent emails or messages that appear to be from a legitimate
source, such as a bank or government agency, in order to trick the recipient into providing personal
information or login credentials.
What is the best way to protect against phishing attacks?
CORRECT ANSWER - The best way to protect against phishing attacks is to educate employees on how to
identify and avoid phishing attempts, and to provide training on how to recognize and report suspicious
emails. Additionally, using anti-phishing software or browser extensions can also help to protect against
these attacks.
What is the difference between encryption and hashing?
CORRECT ANSWER - Encryption is the process of converting plaintext into ciphertext, which can only be
accessed by someone with the decryption key. Hashing is a one-way process that converts plaintext into
a unique fixed-length string of characters, which cannot be reversed to obtain the original plaintext.
How can companies protect their networks from external threats?
CORRECT ANSWER - Companies can protect their networks from external threats by implementing
firewalls and intrusion detection/prevention systems, regularly patching and updating software, using
virtual private networks (VPNs) for remote access, and using strong passwords and multi-factor
authentication.
What is the first step in creating a cybersecurity incident response plan?
CORRECT ANSWER - The first step in creating a cybersecurity incident response plan is to identify the
potential threats and vulnerabilities that your organization may face. This will help you to prioritize the
risks and determine the appropriate response measures to put in place.
, What are the three basic steps of incident response?
CORRECT ANSWER - The three basic steps of incident response are preparation, detection and analysis,
and containment, eradication, and recovery.
What are the steps in incident investigation?
CORRECT ANSWER - The steps in incident investigation are: Identification, Containment, Eradication,
Recovery, and Lessons Learned.
What is the role of incident response team?
CORRECT ANSWER - The role of incident response team is to prepare, detect, analyze, contain, eradicate,
and recover from a cyber incident, and to communicate with internal and external stakeholders
throughout the incident response process.
What is the role of incident commander?
CORRECT ANSWER - The role of incident commander is to lead and coordinate the incident response
effort, to direct the incident response team and to establish incident objectives, strategies and tactics.
What is the purpose of a security audit?
CORRECT ANSWER - The purpose of a security audit is to assess the effectiveness of an organization's
security controls and identify any vulnerabilities or areas for improvement.
What is a penetration test?
CORRECT ANSWER - A penetration test is a simulated cyber attack that is conducted on a computer
system, network, or web application to identify vulnerabilities and assess the effectiveness of security
controls.
What is a social engineering attack?
CORRECT ANSWER - A social engineering attack is a type of security exploit in which the attacker uses
human interaction to trick the victim into providing sensitive information or access to a system.
What is the purpose of a disaster recovery plan?
CORRECT ANSWER - The purpose of a disaster recovery plan is to ensure that an organization can
quickly and effectively respond to and recover from a disruptive event, such as a natural disaster or
cyber attack.
What is the difference between a disaster recovery plan and a business continuity plan?
CORRECT ANSWER - A disaster recovery plan focuses on restoring IT systems and data after a disaster,
while a business continuity plan addresses the broader issues of how an organization will continue to
operate during and after a disaster.