Introduction to Cybersecurity Exam Questions and Answers 2024
7 views 0 purchase
Course
Cyber Security
Institution
Cyber Security
Introduction to Cybersecurity Exam Questions and Answers 2024
Cybersecurity
The ongoing process of protecting systems, networks, programs, data and users from harm.
What is considered personal data?
Medical, Educational, Employment
In the IT world, CIA means
Confidentiality, Integ...
introduction to cybersecurity exam questions and a
cybersecurity the ongoing process of protecting sy
the internet of things iot is a large network of
what program can be used to verify if data has ch
Written for
Cyber Security
Cyber Security
Seller
Follow
julianah420
Reviews received
Content preview
Introduction to Cybersecurity Exam
Questions and Answers 2024
Cybersecurity - answer the ongoing process of protecting systems, networks, programs,
data and users from harm.
What is considered personal data? - answer Medical, Educational, Employment
In the IT world, CIA means - answer Confidentiality, Integrity, Availability
The Internet of Things (IoT) is a large network of physical objects, connections that lead
to an exponential growth of data, called "Big Data," but isn't WHAT? - answer A
traditional computer network.
Confidentiality - answer Ensures the privacy of data.
What program can be used to verify if data has changed or remained the same? -
answer A Hashing program
If you use the same hashing program for a 10 megabyte file and a 100 megabyte file. -
answer The result will be the same fixed-length.
These individuals commit crimes and do arguably unethical things, but not for personal
gain or to cause damage: - answerGrey Hat Hackers
External cyber threats include organized attackers, hackers, and amateurs, but not
WHAT? - answerEmployees
Individuals that must work within the bounds of local, national, and international laws
are WHAT? - answerOrganized Attackers
Another name for the value returned by a hash function is a: - answerDigest
Two methods to ensure confidentiality: - answerUse complex master passwords.
Restrict access through authentication encryption.
Consequences of a security breach are associated with WHAT? - answerOrganizational
data
An internet-based conflict that involves the penetration of computer systems and
networks of other nations. - answerCyberwarfare
, What is EHR? - answerElectronic Health Records
Organizational data is personnel, intellectual, and financial, but NOT: - answerMedical
Patents, trademarks, product plans and trade secrets are considered: -
answerIntellectual data
Access Control Problem - answerIncorrectly regulating who does what and what they
can do with resources.
Buffer Overflow - answerWhen a malicious application access memory allocated to
other processes..
Non-validated Input - answerData coming into a program with malicious content
designed to force the program to behave in unintended ways.
Race Conditions - answerWhen the output of events depend on ordered or timed
outputs.
Symptoms of malware include an increase in CPU usage, files being modified, unknown
processes being run, but ISN'T: - answerAn increases in random access memory.
Methods of infiltration include Social Engineering, Wi-Fi Password Cracking, Phishing,
but NOT: - answerDenial of Service
Taking down a popular bank website and sending emails to the bank's customers
apologizing for the inconvenience is what type of blended attack? - answerDDoS and
Phishing
Sometimes bundled with other software, this malware automatically delivers
advertisements. - answerAdware
Malware designed to automatically perform action, usually online. - answerBot
MitMo (Man-in-the-mobile—middle) - answerMalware use to take control over a mobile
device.
Ransomware - answerMalware that prevents a user's device from properly operating
until a fee is paid.
Rootkit - answerMalware designed to modify operating systems to allow unauthorized
remote access through a backdoor.
(Can modify user privileges, system files and system forensics and monitoring tools,
which makes them extremely difficult to detect and remove.)
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through EFT, credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying this summary from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller julianah420. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy this summary for R259,66. You're not tied to anything after your purchase.