100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CYBER SECURITY | INFORMATION SECURITY Micro Credential Practice Exam

Rating
-
Sold
-
Pages
116
Grade
A+
Uploaded on
07-12-2025
Written in
2025/2026

Learners are assessed on IT systems that support Industry 4.0 operations, including cloud computing, data management, cybersecurity, and industrial IoT. The exam emphasizes practical IT skills for ensuring system efficiency, security, and scalability. It is suited for IT engineers, system architects, and technology managers working in advanced industrial contexts.

Show more Read less
Institution
Course











Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Course

Document information

Uploaded on
December 7, 2025
Number of pages
116
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CYBER SECURITY INFORMATION SECURITY Micro
Credential Practice Exam
**Question 1.** Which of the following best describes the confidentiality
component of the CIA triad?

A) Ensuring data is accurate and unaltered

B) Ensuring data is available when needed

C) Preventing unauthorized disclosure of information

D) Verifying the identity of users

Answer: C

Explanation: Confidentiality protects information from being disclosed to
unauthorized individuals.



**Question 2.** In the context of information security, non‑repudiation is
primarily achieved through:

A) Strong password policies

B) Digital signatures

C) Firewalls

D) Intrusion detection systems

Answer: B

Explanation: Digital signatures provide proof that a specific entity performed an
action, preventing denial of that action.



**Question 3.** A vulnerability is best defined as:

A) An existing exploit in the wild

, CYBER SECURITY INFORMATION SECURITY Micro
Credential Practice Exam
B) A weakness that can be exploited by a threat

C) The intent to cause damage

D) A successful attack on a system

Answer: B

Explanation: A vulnerability is a flaw or weakness that can be leveraged by a
threat actor.



**Question 4.** Which type of malware disguises itself as a legitimate program
but performs malicious actions once executed?

A) Worm

B) Trojan horse

C) Rootkit

D) Logic bomb

Answer: B

Explanation: Trojans appear benign to users but contain hidden malicious
functionality.



**Question 5.** Ransomware primarily impacts which CIA component?

A) Confidentiality

B) Integrity

C) Availability

, CYBER SECURITY INFORMATION SECURITY Micro
Credential Practice Exam
D) Authentication

Answer: C

Explanation: Ransomware encrypts data, making it unavailable to legitimate users
until a ransom is paid.



**Question 6.** A Distributed Denial of Service (DDoS) attack differs from a DoS
attack because:

A) It targets multiple protocols simultaneously

B) It originates from multiple compromised hosts

C) It uses encryption to hide traffic

D) It exploits software vulnerabilities

Answer: B

Explanation: DDoS leverages many distributed sources to overwhelm a target,
unlike a single-source DoS.



**Question 7.** Which social engineering technique involves sending fraudulent
emails that appear to come from a trusted source?

A) Tailgating

B) Vishing

C) Phishing

D) Shoulder surfing

Answer: C

, CYBER SECURITY INFORMATION SECURITY Micro
Credential Practice Exam
Explanation: Phishing uses deceptive emails to trick recipients into revealing
credentials or installing malware.



**Question 8.** Shoulder surfing is an example of:

A) Physical attack

B) Network attack

C) Malware attack

D) Insider threat

Answer: A

Explanation: Shoulder surfing involves observing a user’s credentials or
information directly, a physical security breach.



**Question 9.** An Advanced Persistent Threat (APT) is characterized by:

A) Rapid, high‑volume attacks

B) Short‑term, opportunistic exploits

C) Long‑term, targeted intrusion with stealth

D) Use of ransomware only

Answer: C

Explanation: APTs involve persistent, stealthy intrusion aimed at specific
high‑value targets.
$85.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
teamdiginova1

Get to know the seller

Seller avatar
teamdiginova1 Self
Follow You need to be logged in order to follow users or courses
Sold
1
Member since
1 month
Number of followers
0
Documents
9148
Last sold
4 weeks ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions