IBM Cybersecurity Analyst Professional Certificate
IBM Cybersecurity Analyst Professional Certificate
Exam (elaborations)
IBM Cybersecurity Analyst Professional Certificate Assessment Exam 70 Questions and Correct Answers/Newest Version
8 views 0 purchase
Module
IBM Cybersecurity Analyst Professional Certificate
Institution
IBM Cybersecurity Analyst Professional Certificate
IBM Cybersecurity Analyst Professional Certificate Assessment Exam 70 Questions and Correct Answers/Newest Version
1.
Question 1
Select the answer the fills in the blanks in the correct order.
A weakness in a system is a/an . The potential danger associated with this is a/an that becomes a/...
ibm cybersecurity analyst professional certificate
a weakness in a system is aan the potential da
putting locks on a door is an example of which typ
which of the following defines a security threat
Written for
IBM Cybersecurity Analyst Professional Certificate
IBM Cybersecurity Analyst Professional Certificate
Seller
Follow
Wiseman
Reviews received
Content preview
IBM Cybersecurity Analyst Professional Certificate Assessment
Exam 70 Questions and Correct Answers/Newest Version
1.
Question 1
Select the answer the fills in the blanks in the correct order.
A weakness in a system is a/an . The potential danger associated with this is a/an
that becomes a/an
when attacked by a bad actor.
point
threat, exposure, risk
threat actor, vulnerability, exposure
risk, exploit, threat
vulnerability, threat, exploit
Correct
Correct!
2.
Question 2
Putting locks on a door is an example of which type of control?
point
Preventative
Detective
Corrective
All of the above
Correct
Correct!
3.
Question 3
Which of the following defines a security threat?
, point
Any potential danger capable of exploiting a weakness in a system
The likelihood that the weakness in a system will be exploited
One instance of a weakness being exploited
A weakness in a system that could be exploited by a bad actor
Correct
Correct!
4.
Question 4
Implement a filter to remove flooded packets before they reach the host is a
countermeasure to which form of attack?
point
A Denial of Service (DoS) attack
An IP Spoofing attack
A Phishing attack
All of the above
Correct
Correct!
5.
Question 5
Trudy intercepts a plain text message sent by Alice to Bob but in no way interferes
with its delivery. Which aspect of the CIA Triad was violated?
point
Confidentiality
,Integrity
Availability
All of the above
Correct
Correct!
6.
Question 6
Trudy intercepts a romantic plain-text message from Alice to her boyfriend Sam. The
message upsets Trudy so she forwards it to Bob, making it look like Alice intended it
for Bob from the beginning. Which aspect of the CIA Triad has Trudy violated?
point
Confidentiality
Integrity
Availability
All of the above
Correct
Correct!
7.
Question 7
Which factor contributes most to the strength of an encryption system?
point
The number of private keys used by the system
The secrecy of the encryption algorithm used
The length of the encryption key used
, How many people have access to your public key
Incorrect
Incorrect, this material was covered in the course Introduction to Cybersecurity Tools
& Cyber Attacks, Week 4 - An overview of key security tools
8.
Question 8
What is an advantage asymmetric key encryption has over symmetric key encryption?
point
Asymmetric keys can be exchanged more securely than symmetric keys
Asymmetric key encryption is faster than symmetric key encryption
Asymmetric key encryption is harder to break than symmetric key encryption
Asymmetric key encryption provides better security against Man-in-the-middle attacks
than is possible with symmetric key encryption
Incorrect
9.
Question 9
Which three (3) of the following are key ITIL processes? (Select 3)
point
Incident Management
Correct
Partially correct! This is 1 of the 3 correct answers
Problem Management
Correct
Partially correct! This is 1 of the 3 correct answers
Change Management
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Wiseman. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for £18.33. You're not tied to anything after your purchase.