100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Introduction to Cybersecurity Exam Questions and Answers 2024 $13.99   Add to cart

Exam (elaborations)

Introduction to Cybersecurity Exam Questions and Answers 2024

 0 view  0 purchase
  • Course
  • Cyber Security
  • Institution
  • Cyber Security

Introduction to Cybersecurity Exam Questions and Answers 2024 Cybersecurity The ongoing process of protecting systems, networks, programs, data and users from harm. What is considered personal data? Medical, Educational, Employment In the IT world, CIA means Confidentiality, Integ...

[Show more]

Preview 2 out of 10  pages

  • September 17, 2024
  • 10
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • Cyber Security
  • Cyber Security
avatar-seller
julianah420
Introduction to Cybersecurity Exam
Questions and Answers 2024

Cybersecurity - answer the ongoing process of protecting systems, networks, programs,
data and users from harm.

What is considered personal data? - answer Medical, Educational, Employment

In the IT world, CIA means - answer Confidentiality, Integrity, Availability

The Internet of Things (IoT) is a large network of physical objects, connections that lead
to an exponential growth of data, called "Big Data," but isn't WHAT? - answer A
traditional computer network.

Confidentiality - answer Ensures the privacy of data.

What program can be used to verify if data has changed or remained the same? -
answer A Hashing program

If you use the same hashing program for a 10 megabyte file and a 100 megabyte file. -
answer The result will be the same fixed-length.

These individuals commit crimes and do arguably unethical things, but not for personal
gain or to cause damage: - answerGrey Hat Hackers

External cyber threats include organized attackers, hackers, and amateurs, but not
WHAT? - answerEmployees

Individuals that must work within the bounds of local, national, and international laws
are WHAT? - answerOrganized Attackers

Another name for the value returned by a hash function is a: - answerDigest

Two methods to ensure confidentiality: - answerUse complex master passwords.
Restrict access through authentication encryption.

Consequences of a security breach are associated with WHAT? - answerOrganizational
data

An internet-based conflict that involves the penetration of computer systems and
networks of other nations. - answerCyberwarfare

, What is EHR? - answerElectronic Health Records

Organizational data is personnel, intellectual, and financial, but NOT: - answerMedical

Patents, trademarks, product plans and trade secrets are considered: -
answerIntellectual data

Access Control Problem - answerIncorrectly regulating who does what and what they
can do with resources.

Buffer Overflow - answerWhen a malicious application access memory allocated to
other processes..

Non-validated Input - answerData coming into a program with malicious content
designed to force the program to behave in unintended ways.

Race Conditions - answerWhen the output of events depend on ordered or timed
outputs.

Symptoms of malware include an increase in CPU usage, files being modified, unknown
processes being run, but ISN'T: - answerAn increases in random access memory.

Methods of infiltration include Social Engineering, Wi-Fi Password Cracking, Phishing,
but NOT: - answerDenial of Service

Taking down a popular bank website and sending emails to the bank's customers
apologizing for the inconvenience is what type of blended attack? - answerDDoS and
Phishing

Sometimes bundled with other software, this malware automatically delivers
advertisements. - answerAdware

Malware designed to automatically perform action, usually online. - answerBot

MitMo (Man-in-the-mobile—middle) - answerMalware use to take control over a mobile
device.

Ransomware - answerMalware that prevents a user's device from properly operating
until a fee is paid.

Rootkit - answerMalware designed to modify operating systems to allow unauthorized
remote access through a backdoor.

(Can modify user privileges, system files and system forensics and monitoring tools,
which makes them extremely difficult to detect and remove.)

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller julianah420. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $13.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

72841 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$13.99
  • (0)
  Add to cart