CISCO Cyber security Final Exam
Questions and Answers 2025-2026
Which two characteristics describe a worm? (Choose two.) - ANSWER-is self-
replicating and travels to new computers without any intervention or knowledge of the
user
In what way are zombies used in security attacks? - ANSWER-They are infected
machines that carry out a DDoS attack.
Which tool is used to provide a list of open ports on network devices? - ANSWER-Nmap
What is the most common goal of search engine optimization (SEO) poisoning? -
ANSWER-to increase web traffic to malicious sites
What is the purpose of a rootkit? - ANSWER-to gain privileged access to a device while
concealing itself
How can users working on a shared computer keep their personal browsing history
hidden from other workers that may use this computer? - ANSWER-Operate the web
browser in private browser mode.
What is the best method to prevent Bluetooth from being exploited? - ANSWER-Always
disable Bluetooth when it is not actively used.
A user is surfing the Internet using a laptop at a public WiFi cafe. What should be
checked first when the user connects to the public network? - ANSWER-if the laptop
requires user authentication for file and media sharing
Which configuration on a wireless router is not considered to be adequate security for a
wireless network? - ANSWER-prevent the broadcast of an SSID
A user is having difficulty remembering passwords for multiple online accounts. What is
the best solution for the user to try? - ANSWER-Save the passwords in a centralized
password manager program.
A network administrator is conducting a training session to office staff on how to create
a strong and effective password. Which password would most likely take the longest for
a malicious user to guess or break? - ANSWER-mk$$cittykat104#
A consumer would like to print photographs stored on a cloud storage account using a
third party online printing service. After successfully logging into the cloud account, the
customer is automatically given access to the third party online printing service. What
, allowed this automatic authentication to occur? - ANSWER-The cloud storage service is
an approved application for the online printing servicec
What is the motivation of a white hat attacker? - ANSWER-discovering weaknesses of
networks and systems to improve the security level of these systems
State-sponsored is too: - ANSWER-gather intelligence or commit sabotage on specific
goals on behalf of their government
Terrorists are people who: - ANSWER-make political statements, or create fear, by
causing physical or psychological damage to victims
Hacktivists are people who: - ANSWER-make political statements in order to create an
awareness of issues that are important to them
What are three methods that can be used to ensure confidentiality of information?
(Choose three.) - ANSWER-data encryption, username ID and password, two factor
authentication
What is a reason that internal security threats might cause greater damage to an
organization than external security threats? - ANSWER-Internal users have direct
access to the infrastructure devices.
What three items are components of the CIA triad? (Choose three.) - ANSWER-
availability, integrity, confidentiality
What is another name for confidentiality of information? - ANSWER-privacy
Which statement describes cyberwarfare? - ANSWER-It is Internet-based conflict that
involves the penetration of information systems of other nations.
Which method is used to check the integrity of data? - ANSWER-checksum
What is an example of "hacktivism"? - ANSWER-A group of environmentalists launch a
denial of service attack against an oil company that is responsible for a large oil spill.
The individual user profile on a social network site is an example of a/an
_________ identity. - ANSWER-online
What is the primary goal of a DoS attack? - ANSWER-to prevent the target server from
being able to handle additional requests
Which example illustrates how malware might be concealed? - ANSWER-An email is
sent to the employees of an organization with an attachment that looks like an antivirus
update, but the attachment actually consists of spyware.
Questions and Answers 2025-2026
Which two characteristics describe a worm? (Choose two.) - ANSWER-is self-
replicating and travels to new computers without any intervention or knowledge of the
user
In what way are zombies used in security attacks? - ANSWER-They are infected
machines that carry out a DDoS attack.
Which tool is used to provide a list of open ports on network devices? - ANSWER-Nmap
What is the most common goal of search engine optimization (SEO) poisoning? -
ANSWER-to increase web traffic to malicious sites
What is the purpose of a rootkit? - ANSWER-to gain privileged access to a device while
concealing itself
How can users working on a shared computer keep their personal browsing history
hidden from other workers that may use this computer? - ANSWER-Operate the web
browser in private browser mode.
What is the best method to prevent Bluetooth from being exploited? - ANSWER-Always
disable Bluetooth when it is not actively used.
A user is surfing the Internet using a laptop at a public WiFi cafe. What should be
checked first when the user connects to the public network? - ANSWER-if the laptop
requires user authentication for file and media sharing
Which configuration on a wireless router is not considered to be adequate security for a
wireless network? - ANSWER-prevent the broadcast of an SSID
A user is having difficulty remembering passwords for multiple online accounts. What is
the best solution for the user to try? - ANSWER-Save the passwords in a centralized
password manager program.
A network administrator is conducting a training session to office staff on how to create
a strong and effective password. Which password would most likely take the longest for
a malicious user to guess or break? - ANSWER-mk$$cittykat104#
A consumer would like to print photographs stored on a cloud storage account using a
third party online printing service. After successfully logging into the cloud account, the
customer is automatically given access to the third party online printing service. What
, allowed this automatic authentication to occur? - ANSWER-The cloud storage service is
an approved application for the online printing servicec
What is the motivation of a white hat attacker? - ANSWER-discovering weaknesses of
networks and systems to improve the security level of these systems
State-sponsored is too: - ANSWER-gather intelligence or commit sabotage on specific
goals on behalf of their government
Terrorists are people who: - ANSWER-make political statements, or create fear, by
causing physical or psychological damage to victims
Hacktivists are people who: - ANSWER-make political statements in order to create an
awareness of issues that are important to them
What are three methods that can be used to ensure confidentiality of information?
(Choose three.) - ANSWER-data encryption, username ID and password, two factor
authentication
What is a reason that internal security threats might cause greater damage to an
organization than external security threats? - ANSWER-Internal users have direct
access to the infrastructure devices.
What three items are components of the CIA triad? (Choose three.) - ANSWER-
availability, integrity, confidentiality
What is another name for confidentiality of information? - ANSWER-privacy
Which statement describes cyberwarfare? - ANSWER-It is Internet-based conflict that
involves the penetration of information systems of other nations.
Which method is used to check the integrity of data? - ANSWER-checksum
What is an example of "hacktivism"? - ANSWER-A group of environmentalists launch a
denial of service attack against an oil company that is responsible for a large oil spill.
The individual user profile on a social network site is an example of a/an
_________ identity. - ANSWER-online
What is the primary goal of a DoS attack? - ANSWER-to prevent the target server from
being able to handle additional requests
Which example illustrates how malware might be concealed? - ANSWER-An email is
sent to the employees of an organization with an attachment that looks like an antivirus
update, but the attachment actually consists of spyware.