100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Cyber Security Exam Question And Answers 2023

Rating
-
Sold
-
Pages
5
Grade
A+
Uploaded on
06-05-2023
Written in
2022/2023

Cyber Security Exam Question And Answers 2023

Institution
Cyber Security
Course
Cyber Security









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Cyber Security
Course
Cyber Security

Document information

Uploaded on
May 6, 2023
Number of pages
5
Written in
2022/2023
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

  • cyber security exam

Content preview

Cyber Security Exam Question And Answers 2023
What are the Cyber Security principals and what do they stand for? - Correct Answer-
CIA - Confidentiality, Integrity, Availability
What is one of the most important parts of defending and attacking in cybersecurity? - Correct Answer-Research
Software designed for malicious purposes, or malicious software. It can be hidden in a computer program, a piece of code, and even embedded in hardware. - Correct Answer-Malware
Self-replicating software that targets systems in a computer and attaches itself to them upon execution. As a virus spreads across a computer, it may corrupt or destroy data and cause a lot of damage - Correct Answer-Virus
Similar to a virus, a worm self-replicates, but does not require user intervention for it to be executed. It can spread to other computers, typically over a network - Correct Answer-Worm
Code that masquerades as a legitimate program but causes a lot of damage when executed. Trojan horses do not self-replicate like worms or viruses. They can, however, create backdoors in systems, or use system resources for various purposes, such as crypto mining - Correct Answer-Trojan Horse
Malware that attempts to harvest information from a computer. The possibly confidential
information is copied to the attacker's computer - Correct Answer-Spyware
Malware that encrypts computer files and prevents them from being accessed or restored. Widely used for financial purposes, including demands for payment in return for decrypting the files - Correct Answer-Ransomware
What does ACL stand for? - Correct Answer-Access Control List
What does NAT stand for? - Correct Answer-Network Address Translation
What does WAN stand for? - Correct Answer-Wide Area Network
What does NIC stand for? - Correct Answer-Network Interface Card
What does LAN stand for? - Correct Answer-Local Area Network Pieces of information (data) sent across a network. - Correct Answer-Packets
Two or more computers connected and grouped together in a specific framework - Correct Answer-Networks
Powerful computers designed to provide services to other computers, such as web services, storage services, and email services. - Correct Answer-Servers
Machines that can perform calculations, accomplish complicated operations, and execute programs based on a sequence of commands and inserted input - Correct Answer-Computers
Devices or software that use different services provided by servers. They establish communication with a server and request its services. Clients can also refer to software,
such as browsers. The browser is a client that uses the services provided by HTTP servers. - Correct Answer-Clients
Devices connected to a network, such as computers, servers, phones, and IoT devices. - Correct Answer-Endpoint Devices
A network device designed to forward packets based on their MAC addresses within a network. - Correct Answer-Switch
A network device designed to forward packets based on their IP addresses between networks. - Correct Answer-Router
Predefined sets of rules describing how something should work or behave. They help maintain order among different technologies. - Correct Answer-Protocols
Is a distributed application structure that manages tasks and workloads. Workloads are shared among resource and service providers (servers), and responses are delivered to
clients who request those services. - Correct Answer-Client-Server Communication
What type of protocol is 192.168.0.0 - Correct Answer-IPv4
What type of protocol is 2001:0db8:0000:0042:0000:8a2e:0370:7334 - Correct Answer-
IPv6
The smallest data unit a computer uses - Correct Answer-Bit
What is a hypervisor? - Correct Answer-software that creates and manages a virtual machine on a host machine
What type of ware is hypervisor type 1 - Correct Answer-Hardware
What type of ware is hypervisor type 2 - Correct Answer-Software

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
professoraxel Havard School
View profile
Follow You need to be logged in order to follow users or courses
Sold
2345
Member since
3 year
Number of followers
1567
Documents
19244
Last sold
1 day ago
THE EASIEST WAY TO STUDY NURSING EXAMS,STUDY GUIDES,TESTBANKS AND QUALITY EXAMS

Better grades start here! Find Study Notes, Exam answer packs, Assignment guided solutions and more. Study faster & better. Always leave a review after purchasing any document so as to make sure our customers are 100% satisfied.....All the Best!!!!!!

3.8

442 reviews

5
204
4
79
3
85
2
24
1
50

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions