UNIT 3- CYBER SECURITY SAMPLE QUESTIONS WITH CERTIFIED
ANSWERS #17
What is cyber security? - correct answer the way in which an individual/organisation manages
its hardware, software, information and data.
What is the cia triad? - correct answer a cyber security methodology that manages cyber
security standing for confidentiality, integrity and availability.
What is a packet sniffer? - correct answer a device that monitors data across a network able to
see everything that passes.
What is a symmetric key? - correct answer when the encryption and decryption codes are the
same.
What is an asymmetric or public key? - correct answer everyone has access to the encryption
key but only the recipient has access to the decryption key.
What are the two types of privilege escalation? - correct answer vertical- users exploit bugs in a
system to gain higher level privileges.
Horizontal- when another user gains access to someone on the same levels account.
What are the 6 types of cyber incidents? - correct answer unauthorised access to data
Modification of data
Destruction of data
Information disclosure
Inaccessible data
Theft of data
Why should you protect your data? - correct answer mail can be intercepted
, Identity can be stolen
May not be allowed insurance
Why should an organisation protect its data? - correct answer to protect income and ips
They have to protect staff data under the dpa.
What is a vulnerability? - correct answer a flaw or issue that results in weakness of a system.
Name 3 types of threat. - correct answer system attacks (ddos, botnets)
Physical
Environmental
State 4 examples of organised cyber crime. - correct answer stealing identities.
Stealing ip.
Black mail.
Emptying bank accounts.
Name all 8 types of attackers. - correct answer cyber criminal, hacktivist, cyber terrorist, insider,
vulnerability broker, script kiddie, scammer, phisher.
What is a script kiddie? - correct answer some who uses software or scripts created by others to
attack devices. (often done for thrill)
Name threats to mobile devices. - correct answer can be lost.
Less likely to have antivirus.
Can connect to networks automatically in some cases.
ANSWERS #17
What is cyber security? - correct answer the way in which an individual/organisation manages
its hardware, software, information and data.
What is the cia triad? - correct answer a cyber security methodology that manages cyber
security standing for confidentiality, integrity and availability.
What is a packet sniffer? - correct answer a device that monitors data across a network able to
see everything that passes.
What is a symmetric key? - correct answer when the encryption and decryption codes are the
same.
What is an asymmetric or public key? - correct answer everyone has access to the encryption
key but only the recipient has access to the decryption key.
What are the two types of privilege escalation? - correct answer vertical- users exploit bugs in a
system to gain higher level privileges.
Horizontal- when another user gains access to someone on the same levels account.
What are the 6 types of cyber incidents? - correct answer unauthorised access to data
Modification of data
Destruction of data
Information disclosure
Inaccessible data
Theft of data
Why should you protect your data? - correct answer mail can be intercepted
, Identity can be stolen
May not be allowed insurance
Why should an organisation protect its data? - correct answer to protect income and ips
They have to protect staff data under the dpa.
What is a vulnerability? - correct answer a flaw or issue that results in weakness of a system.
Name 3 types of threat. - correct answer system attacks (ddos, botnets)
Physical
Environmental
State 4 examples of organised cyber crime. - correct answer stealing identities.
Stealing ip.
Black mail.
Emptying bank accounts.
Name all 8 types of attackers. - correct answer cyber criminal, hacktivist, cyber terrorist, insider,
vulnerability broker, script kiddie, scammer, phisher.
What is a script kiddie? - correct answer some who uses software or scripts created by others to
attack devices. (often done for thrill)
Name threats to mobile devices. - correct answer can be lost.
Less likely to have antivirus.
Can connect to networks automatically in some cases.