FBLA CYBER SECURITY gmetrix
(Information Technology Specialist) Exam
Actual Questions and Answers 2026
For the following statement, select True or False.
A Business Continuity Plan is important because it specifies how a
business will restore critical business functions in the event of a
disaster. -
correct answer ✅True
What is the term for a collection of software tools used by an
attacker to obtain administrator-level access to a computer? -
correct answer ✅Rootkit
Rootkit: This answer is correct because a rootkit may give hackers
admin-level privileges to a computer. Backdoor: This answer is
incorrect because it is only a way of gaining access, not admin
access.
Which type of encryption algorithm uses a pre-shared key to
encrypt and decrypt data? -
correct answer ✅Symmetric
Symmetric: This answer is correct because symmetric algorithms
use the same pre-shared key to encrypt and decrypt data. A pre-
,FBLA CYBER SECURITY gmetrix
(Information Technology Specialist) Exam
Actual Questions and Answers 2026
shared key, also called a secret key, is known by the sender and
receiver before any encrypted communications can take place.
Asymmetric: This answer is incorrect because asymmetric
algorithms do not pre-share a key. Asymmetric algorithms use a
public key and a private key which are dynamically exchanged when
between source and destination.
Diffie-Hellman: This answer is incorrect because Diffie-Hellman is a
key exchange protocol that uses a public key to encrypt and decrypt
the conversation.
SHA-2: This answer is incorrect because SHA-2 is a hashing
algorithm.
Complete the sentence by selecting the correct option from the
drop-down list.
,FBLA CYBER SECURITY gmetrix
(Information Technology Specialist) Exam
Actual Questions and Answers 2026
blank is used to find vulnerabilities within a computer system.
Penetration testing -
correct answer ✅Penetration testing: This answer is correct
because it is used to find weaknesses that can be used to exploit a
computer system.
A firewall: This answer is incorrect because firewalls help to protect
a computer system.
Spyware: This answer is incorrect because there is already an
attack/exploit of the computer system.
System testing: This answer is incorrect because system testing is
used to test how software integrates with a system.
put a word with definition
O Emergency -
1 Alert -
, FBLA CYBER SECURITY gmetrix
(Information Technology Specialist) Exam
Actual Questions and Answers 2026
2 Critical Critical conditions
3 Error - Error conditions
4 Warning -
5 Notice -
6 Informational -
7 Debug -
- May indicate an error will occur if action is not taken
- Error conditions
- Should be corrected immediately
- Events that are unusual but not error conditions
- Normal operational events that require no action
- Critical Critical conditions
- Information useful to developers
- System is unusable -
correct answer ✅The syslog logging levels and what they
represent are as follows.
(Information Technology Specialist) Exam
Actual Questions and Answers 2026
For the following statement, select True or False.
A Business Continuity Plan is important because it specifies how a
business will restore critical business functions in the event of a
disaster. -
correct answer ✅True
What is the term for a collection of software tools used by an
attacker to obtain administrator-level access to a computer? -
correct answer ✅Rootkit
Rootkit: This answer is correct because a rootkit may give hackers
admin-level privileges to a computer. Backdoor: This answer is
incorrect because it is only a way of gaining access, not admin
access.
Which type of encryption algorithm uses a pre-shared key to
encrypt and decrypt data? -
correct answer ✅Symmetric
Symmetric: This answer is correct because symmetric algorithms
use the same pre-shared key to encrypt and decrypt data. A pre-
,FBLA CYBER SECURITY gmetrix
(Information Technology Specialist) Exam
Actual Questions and Answers 2026
shared key, also called a secret key, is known by the sender and
receiver before any encrypted communications can take place.
Asymmetric: This answer is incorrect because asymmetric
algorithms do not pre-share a key. Asymmetric algorithms use a
public key and a private key which are dynamically exchanged when
between source and destination.
Diffie-Hellman: This answer is incorrect because Diffie-Hellman is a
key exchange protocol that uses a public key to encrypt and decrypt
the conversation.
SHA-2: This answer is incorrect because SHA-2 is a hashing
algorithm.
Complete the sentence by selecting the correct option from the
drop-down list.
,FBLA CYBER SECURITY gmetrix
(Information Technology Specialist) Exam
Actual Questions and Answers 2026
blank is used to find vulnerabilities within a computer system.
Penetration testing -
correct answer ✅Penetration testing: This answer is correct
because it is used to find weaknesses that can be used to exploit a
computer system.
A firewall: This answer is incorrect because firewalls help to protect
a computer system.
Spyware: This answer is incorrect because there is already an
attack/exploit of the computer system.
System testing: This answer is incorrect because system testing is
used to test how software integrates with a system.
put a word with definition
O Emergency -
1 Alert -
, FBLA CYBER SECURITY gmetrix
(Information Technology Specialist) Exam
Actual Questions and Answers 2026
2 Critical Critical conditions
3 Error - Error conditions
4 Warning -
5 Notice -
6 Informational -
7 Debug -
- May indicate an error will occur if action is not taken
- Error conditions
- Should be corrected immediately
- Events that are unusual but not error conditions
- Normal operational events that require no action
- Critical Critical conditions
- Information useful to developers
- System is unusable -
correct answer ✅The syslog logging levels and what they
represent are as follows.