100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
Cyber Security Exam Question And Answers 2023 $10.99   Add to cart

Exam (elaborations)

Cyber Security Exam Question And Answers 2023

 86 views  0 purchase
  • Course
  • Cyber Security
  • Institution
  • Cyber Security

Cyber Security Exam Question And Answers 2023

Preview 2 out of 5  pages

  • May 6, 2023
  • 5
  • 2022/2023
  • Exam (elaborations)
  • Questions & answers
  • cyber security exam
  • Cyber Security
  • Cyber Security
avatar-seller
professoraxel
Cyber Security Exam Question And Answers 2023
What are the Cyber Security principals and what do they stand for? - Correct Answer-
CIA - Confidentiality, Integrity, Availability
What is one of the most important parts of defending and attacking in cybersecurity? - Correct Answer-Research
Software designed for malicious purposes, or malicious software. It can be hidden in a computer program, a piece of code, and even embedded in hardware. - Correct Answer-Malware
Self-replicating software that targets systems in a computer and attaches itself to them upon execution. As a virus spreads across a computer, it may corrupt or destroy data and cause a lot of damage - Correct Answer-Virus
Similar to a virus, a worm self-replicates, but does not require user intervention for it to be executed. It can spread to other computers, typically over a network - Correct Answer-Worm
Code that masquerades as a legitimate program but causes a lot of damage when executed. Trojan horses do not self-replicate like worms or viruses. They can, however, create backdoors in systems, or use system resources for various purposes, such as crypto mining - Correct Answer-Trojan Horse
Malware that attempts to harvest information from a computer. The possibly confidential
information is copied to the attacker's computer - Correct Answer-Spyware
Malware that encrypts computer files and prevents them from being accessed or restored. Widely used for financial purposes, including demands for payment in return for decrypting the files - Correct Answer-Ransomware
What does ACL stand for? - Correct Answer-Access Control List
What does NAT stand for? - Correct Answer-Network Address Translation
What does WAN stand for? - Correct Answer-Wide Area Network
What does NIC stand for? - Correct Answer-Network Interface Card
What does LAN stand for? - Correct Answer-Local Area Network Pieces of information (data) sent across a network. - Correct Answer-Packets
Two or more computers connected and grouped together in a specific framework - Correct Answer-Networks
Powerful computers designed to provide services to other computers, such as web services, storage services, and email services. - Correct Answer-Servers
Machines that can perform calculations, accomplish complicated operations, and execute programs based on a sequence of commands and inserted input - Correct Answer-Computers
Devices or software that use different services provided by servers. They establish communication with a server and request its services. Clients can also refer to software,
such as browsers. The browser is a client that uses the services provided by HTTP servers. - Correct Answer-Clients
Devices connected to a network, such as computers, servers, phones, and IoT devices. - Correct Answer-Endpoint Devices
A network device designed to forward packets based on their MAC addresses within a network. - Correct Answer-Switch
A network device designed to forward packets based on their IP addresses between networks. - Correct Answer-Router
Predefined sets of rules describing how something should work or behave. They help maintain order among different technologies. - Correct Answer-Protocols
Is a distributed application structure that manages tasks and workloads. Workloads are shared among resource and service providers (servers), and responses are delivered to
clients who request those services. - Correct Answer-Client-Server Communication
What type of protocol is 192.168.0.0 - Correct Answer-IPv4
What type of protocol is 2001:0db8:0000:0042:0000:8a2e:0370:7334 - Correct Answer-
IPv6
The smallest data unit a computer uses - Correct Answer-Bit
What is a hypervisor? - Correct Answer-software that creates and manages a virtual machine on a host machine
What type of ware is hypervisor type 1 - Correct Answer-Hardware
What type of ware is hypervisor type 2 - Correct Answer-Software

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller professoraxel. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $10.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

82871 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$10.99
  • (0)
  Add to cart