Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

CYB 1 – Introduction to Cybersecurity 3

Rating
-
Sold
-
Pages
24
Grade
A+
Uploaded on
17-03-2025
Written in
2024/2025

CYB 1 – Introduction to Cybersecurity 3

Institution
Introduction To Cybersecurity
Course
Introduction to cybersecurity

Content preview

1. Which of the following is the main purpose of "End-to-End Encryption"?

A. To ensure data remains encrypted while being transmitted between two parties

B. To prevent unauthorized users from accessing a website

C. To create backups of data

D. To protect physical hardware from theft

Answer: a) To ensure data remains encrypted while being transmitted between two

parties

Rationale: End-to-end encryption protects data during transmission, ensuring that only

the sender and recipient can read it.




2. Which of the following is an example of "Multi-factor Authentication"?

A. Using a password and answering a security question

B. Using a password and a unique code sent to your phone

C. Using a password and an email verification link

D. Using a password and a fingerprint scan

Answer: b) Using a password and a unique code sent to your phone

Rationale: Multi-factor authentication (MFA) involves using more than one verification

method, such as something you know (password) and something you have (code sent

to a phone).




3. What does the term "Data Breach" refer to?

,A. The unauthorized access, acquisition, or disclosure of sensitive data

B. A network disruption caused by a denial-of-service attack

C. A legitimate access to protected data by an authorized user

D. A software vulnerability that has been patched

Answer: a) The unauthorized access, acquisition, or disclosure of sensitive data

Rationale: A data breach occurs when sensitive data is accessed or stolen by

unauthorized individuals.




4. What does "encryption" do in the context of cybersecurity?

A. Protects the data by making it unreadable to unauthorized users

B. Increases the speed of data transmission

C. Stores data in a cloud-based server

D. Backs up data to prevent loss

Answer: a) Protects the data by making it unreadable to unauthorized users

Rationale: Encryption transforms readable data into a format that cannot be easily

understood by unauthorized users without a decryption key.




5. What is the best practice when creating strong passwords?

A. Use only letters and numbers

B. Use long and complex passwords with a combination of letters, numbers, and

symbols

C. Use a password that is easy to remember

, D. Reuse passwords across multiple accounts for convenience

Answer: b) Use long and complex passwords with a combination of letters, numbers,

and symbols

Rationale: Complex passwords are more difficult for attackers to guess or crack,

enhancing security.




6. What is "Cryptojacking"?

A. A technique for stealing cryptocurrency wallets

B. A method of using infected computers to mine cryptocurrency without user consent

C. A way to store cryptocurrency securely

D. A method of encrypting files for ransom

Answer: b) A method of using infected computers to mine cryptocurrency without user

consent

Rationale: Cryptojacking involves hijacking the processing power of users' devices to

mine cryptocurrency without their consent.




7. Which of the following is a type of malware that spreads by replicating itself?

A. Trojan Horse

B. Virus

C. Spyware

D. Ransomware

Answer: b) Virus

Written for

Institution
Introduction to cybersecurity
Course
Introduction to cybersecurity

Document information

Uploaded on
March 17, 2025
Number of pages
24
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$10.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller
Seller avatar
douglasmugwe82
5.0
(1)

Get to know the seller

Seller avatar
douglasmugwe82 Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
2
Member since
1 year
Number of followers
0
Documents
4239
Last sold
5 months ago
fully answered questions and answer

fully answered questions and answer

5.0

1 reviews

5
1
4
0
3
0
2
0
1
0

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions