100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

NETWORK SECURITY CERTIFIED QUESTIONS AND ANSWERS

Rating
-
Sold
-
Pages
10
Grade
A+
Uploaded on
10-11-2025
Written in
2025/2026

NETWORK SECURITY CERTIFIED QUESTIONS AND ANSWERS

Institution
CyberSecurity Certified
Course
CyberSecurity Certified









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CyberSecurity Certified
Course
CyberSecurity Certified

Document information

Uploaded on
November 10, 2025
Number of pages
10
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

NETWORK SECURITY CERTIFIED QUESTIONS AND ANSWERS #7
Access control - correct answer a method for determining and assigning privileges to resources


Adware - correct answer produces pop-up messages in internet explorer, the windows
messenger service, or other applications


Algorithms - correct answer a rule or mechanism used to encrypt data


Anti-malware programs - correct answer help to prevent malicious code from executing on the
system


Asymmetric key encryption - correct answer uses a pair of keys, one public and the other
private


Attacker - correct answer a person with malicious intent


Auditing (accounting) - correct answer a stage involving the tracking of user activities and
actions that can include the length of connection time, access types, data transfer, etc.


Authentication - correct answer the process of validating the identity of an individual to the
system


Authorization - correct answer the process of determining the level of access that is going to be
granted to a user based on their identity


Backdoor attack - correct answer an attacker creates an alternative way into the system via
remote access


Block cipher - correct answer encrypts data one block at a time often in 64-bit chunks, which is
more secure but generally slower

, Bluejacking - correct answer a way of spamming a device with messages using a bluetooth
connection


Bluesnarfing - correct answer occurs when an attacker gains unauthorized access to data
contained on the mobile device via a bluetooth connection


Botnets - correct answer systems that are functioning as drones or zombies due to the fact that
a trojan horse has placed undesirable software to allow them to be remotely controlled


Brute-force attacks - correct answer go one character at a time and can utilize special
characters in alphanumeric passwords, making them the most difficult to defend against


Buffer overflows - correct answer used by attackers to fill up and exceed the extent of a
memory buffer, allowing code to be executed against the destination system which can cause
an application to crash, the system to reboot, or any number of other problems


Business continuity plan - correct answer ensures the ongoing availability of the infrastructure
and the services that it provides


Chain of custody - correct answer a paper trail that documents the chronological handling of
evidence and can be used in criminal cases


Change management - correct answer refers to a set of procedures that are followed when
network and/or system changes, that are developed by the network staff, are made


Cia triad - correct answer three fundamental principles that everyone will seek to implement to
ensure the security of corporate assets: confidentiality, which means that private information
needs to remain secure and accessible to authorized parties.
$9.16
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
simonnjaramba

Also available in package deal

Thumbnail
Package deal
CYBER SECURITY REVISED QUESTIONS WITH CERTIFIED ANSWERS
-
16 2025
$ 176.24 More info

Get to know the seller

Seller avatar
simonnjaramba Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
New on Stuvia
Member since
2 months
Number of followers
0
Documents
113
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions