IBM Cybersecurity Analyst Professional Certificate
IBM Cybersecurity Analyst Professional Certificate
Tentamen (uitwerkingen)
IBM Cybersecurity Analyst Professional Certificate Assessment Exam 70 Questions and Correct Answers/Newest Version
9 keer bekeken 0 keer verkocht
Vak
IBM Cybersecurity Analyst Professional Certificate
Instelling
IBM Cybersecurity Analyst Professional Certificate
IBM Cybersecurity Analyst Professional Certificate Assessment Exam 70 Questions and Correct Answers/Newest Version
1.
Question 1
Select the answer the fills in the blanks in the correct order.
A weakness in a system is a/an . The potential danger associated with this is a/an that becomes a/...
ibm cybersecurity analyst professional certificate
a weakness in a system is aan the potential da
putting locks on a door is an example of which typ
which of the following defines a security threat
Geschreven voor
IBM Cybersecurity Analyst Professional Certificate
IBM Cybersecurity Analyst Professional Certificate
Verkoper
Volgen
Wiseman
Ontvangen beoordelingen
Voorbeeld van de inhoud
IBM Cybersecurity Analyst Professional Certificate Assessment
Exam 70 Questions and Correct Answers/Newest Version
1.
Question 1
Select the answer the fills in the blanks in the correct order.
A weakness in a system is a/an . The potential danger associated with this is a/an
that becomes a/an
when attacked by a bad actor.
point
threat, exposure, risk
threat actor, vulnerability, exposure
risk, exploit, threat
vulnerability, threat, exploit
Correct
Correct!
2.
Question 2
Putting locks on a door is an example of which type of control?
point
Preventative
Detective
Corrective
All of the above
Correct
Correct!
3.
Question 3
Which of the following defines a security threat?
, point
Any potential danger capable of exploiting a weakness in a system
The likelihood that the weakness in a system will be exploited
One instance of a weakness being exploited
A weakness in a system that could be exploited by a bad actor
Correct
Correct!
4.
Question 4
Implement a filter to remove flooded packets before they reach the host is a
countermeasure to which form of attack?
point
A Denial of Service (DoS) attack
An IP Spoofing attack
A Phishing attack
All of the above
Correct
Correct!
5.
Question 5
Trudy intercepts a plain text message sent by Alice to Bob but in no way interferes
with its delivery. Which aspect of the CIA Triad was violated?
point
Confidentiality
,Integrity
Availability
All of the above
Correct
Correct!
6.
Question 6
Trudy intercepts a romantic plain-text message from Alice to her boyfriend Sam. The
message upsets Trudy so she forwards it to Bob, making it look like Alice intended it
for Bob from the beginning. Which aspect of the CIA Triad has Trudy violated?
point
Confidentiality
Integrity
Availability
All of the above
Correct
Correct!
7.
Question 7
Which factor contributes most to the strength of an encryption system?
point
The number of private keys used by the system
The secrecy of the encryption algorithm used
The length of the encryption key used
, How many people have access to your public key
Incorrect
Incorrect, this material was covered in the course Introduction to Cybersecurity Tools
& Cyber Attacks, Week 4 - An overview of key security tools
8.
Question 8
What is an advantage asymmetric key encryption has over symmetric key encryption?
point
Asymmetric keys can be exchanged more securely than symmetric keys
Asymmetric key encryption is faster than symmetric key encryption
Asymmetric key encryption is harder to break than symmetric key encryption
Asymmetric key encryption provides better security against Man-in-the-middle attacks
than is possible with symmetric key encryption
Incorrect
9.
Question 9
Which three (3) of the following are key ITIL processes? (Select 3)
point
Incident Management
Correct
Partially correct! This is 1 of the 3 correct answers
Problem Management
Correct
Partially correct! This is 1 of the 3 correct answers
Change Management
Voordelen van het kopen van samenvattingen bij Stuvia op een rij:
Verzekerd van kwaliteit door reviews
Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!
Snel en makkelijk kopen
Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.
Focus op de essentie
Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!
Veelgestelde vragen
Wat krijg ik als ik dit document koop?
Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.
Tevredenheidsgarantie: hoe werkt dat?
Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.
Van wie koop ik deze samenvatting?
Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper Wiseman. Stuvia faciliteert de betaling aan de verkoper.
Zit ik meteen vast aan een abonnement?
Nee, je koopt alleen deze samenvatting voor €22,23. Je zit daarna nergens aan vast.