NOCTI: Cybersecurity Fundamentals Exam Questions With 100% Correct Answers | Update 2026 | Graded A+
NOCTI: Cybersecurity Fundamentals Exam Questions With 100% Correct Answers | Update 2026 | Graded A+ A. phishing - answer-The fraudulent practice of sending emails claiming to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers, is also known as A. phishing B. white hat hacking C. instant messaging D. surfing B. theft - answer-When thieves steal your personal information to take over or open new accounts, file fake tax returns, rent or buy properties, or do other criminal things in your name, you have been a victim of identity ________ A. spamming B. theft C. surfing D. encryption C. making a one-to-one copy of all files - answer-What is an important aspect of evidence gathering? A. deleting log files B. removing infected files from the systemC. making a one-to-one copy of all files D. allowing users to resume work on a system D. make a one-to-one copy of the disk - answer-When performing forensic activities on a disk to see what kind of information it contains, the first step is to A. install backup software on the disk B. examine the hard drive content further C. terminate the employee's employment immediately D. make a one-to-one copy of the disk D. low and the impact is extremely low - answer-An organization can accept a risk and defer it if the risk is considered A. high and the impact is extremely low B. high and the impact is extremely high C. low and the impact is extremely high D. low and the impact is extremely low C. data redundancy - answer-Data in the cloud is backed up and stored across multiple servers in the world. This is an example of A. decreased data capacityB. increased data capacity C. data redundancy D. data degradation B. risk mitigation - answer-A company decides to apply updates to a software package immediately. Which type of risk management does this represent? A. risk acceptance B. risk mitigation C. risk categorization D. risk deferment A. blacklisting - answer-Restricting access to a website for a specific user group is known as A. blacklisting B. whitelisting C. bluelisting D. redlisting B. Virtual Private Network (VPN) - answer-What technology was developed to allow remote users and branch offices to access corporate applications and resources via secure encrypted connection? A. Access Control Lists (ACL) B. Virtual Private Network (VPN)C. SONNET Ring D. Integrated Digital Services Network (ISDN)
Escuela, estudio y materia
- Institución
- NOCTI
- Grado
- NOCTI
Información del documento
- Subido en
- 4 de febrero de 2026
- Número de páginas
- 10
- Escrito en
- 2025/2026
- Tipo
- Examen
- Contiene
- Preguntas y respuestas
Temas
-
nocti cybersecurity fundamentals exam questions w
Documento también disponible en un lote