Escrito por estudiantes que aprobaron Inmediatamente disponible después del pago Leer en línea o como PDF ¿Documento equivocado? Cámbialo gratis 4,6 TrustPilot
logo-home
Examen

CYB 1 – Introduction to Cybersecurity 5

Puntuación
-
Vendido
-
Páginas
24
Grado
A+
Subido en
17-03-2025
Escrito en
2024/2025

CYB 1 – Introduction to Cybersecurity 5

Institución
Introduction To Cybersecurity
Grado
Introduction to cybersecurity

Vista previa del contenido

1. Which security mechanism ensures that data has not been tampered with during

transmission?

A. Confidentiality

B. Integrity

C. Availability

D. Authentication

Answer: b) Integrity

Rationale: Integrity ensures that data remains accurate and unaltered during

transmission or storage.




2. What is the role of a "Security Information and Event Management" (SIEM) system?

A. To provide real-time analysis and reporting of security incidents

B. To prevent unauthorized network access

C. To encrypt sensitive data

D. To manage the distribution of antivirus software

Answer: a) To provide real-time analysis and reporting of security incidents

Rationale: SIEM systems aggregate and analyze security data to provide real-time

alerts and reports about security incidents.




3. What is a "Backdoor" in cybersecurity?

,A. A security flaw that can be exploited by attackers

B. A way for administrators to access systems remotely for maintenance

C. A method to encrypt and decrypt messages

D. A type of Trojan Horse used for remote control of systems

Answer: b) A way for administrators to access systems remotely for maintenance

Rationale: A backdoor is often a legitimate method of remote access for system

administrators but can be exploited by attackers if left unsecured.




4. What is "Keylogging"?

A. A method of capturing network traffic for analysis

B. A technique used by attackers to record keystrokes on a victim's device

C. A method of encrypting sensitive information

D. A process for securely backing up data

Answer: b) A technique used by attackers to record keystrokes on a victim's device

Rationale: Keylogging involves tracking and recording the keys a user presses on their

keyboard, often used for stealing passwords or sensitive information.




5. What is a "Botnet"?

A. A network of infected computers controlled remotely by attackers

B. A system that protects networks from malicious attacks

C. A type of firewall that blocks all incoming traffic

D. A method of encrypting internet communications

, Answer: a) A network of infected computers controlled remotely by attackers

Rationale: A botnet is a group of compromised computers that can be controlled

remotely to carry out malicious activities.




6. What is the purpose of "Data Backup" in cybersecurity?

A. To prevent unauthorized access to files

B. To create copies of data for recovery in case of a disaster or attack

C. To encrypt data for secure storage

D. To monitor data for unusual activity

Answer: b) To create copies of data for recovery in case of a disaster or attack

Rationale: Data backup ensures that critical information can be restored in the event of

data loss, ransomware attacks, or system failures.




7. What is "Patch Tuesday"?

A. A day when software companies release security patches and updates

B. A technique to detect unauthorized access

C. A cybersecurity tool used to monitor activities

D. A scheduled time for system backups

Answer: a) A day when software companies release security patches and updates

Rationale: Patch Tuesday is a regular release day for Microsoft updates and security

patches, typically occurring on the second Tuesday of each month.

Escuela, estudio y materia

Institución
Introduction to cybersecurity
Grado
Introduction to cybersecurity

Información del documento

Subido en
17 de marzo de 2025
Número de páginas
24
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$10.99
Accede al documento completo:

¿Documento equivocado? Cámbialo gratis Dentro de los 14 días posteriores a la compra y antes de descargarlo, puedes elegir otro documento. Puedes gastar el importe de nuevo.
Escrito por estudiantes que aprobaron
Inmediatamente disponible después del pago
Leer en línea o como PDF

Conoce al vendedor
Seller avatar
douglasmugwe82
5.0
(1)

Conoce al vendedor

Seller avatar
douglasmugwe82 Teachme2-tutor
Ver perfil
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
2
Miembro desde
1 año
Número de seguidores
0
Documentos
4239
Última venta
5 meses hace
fully answered questions and answer

fully answered questions and answer

5.0

1 reseñas

5
1
4
0
3
0
2
0
1
0

Documentos populares

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes