100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

Cybersecurity Fundamentals – Practice Test with Answers | DoD & CompTIA-Aligned Concepts | Complete 80-Question Set

Rating
-
Sold
-
Pages
26
Grade
A+
Uploaded on
13-05-2025
Written in
2024/2025

This document provides a full 80-question practice test covering foundational cybersecurity concepts, including network security, malware types, encryption, access control, VPNs, and incident response. It is aligned with Department of Defense (DoD 8570.01-M) and CompTIA Security+ standards and includes scenarios and multiple-choice questions for IAM Levels I–III. This resource is ideal for students or professionals preparing for cybersecurity certifications or compliance training within military or enterprise contexts.

Show more Read less
Institution
Cybersecurity Fundamentals
Course
Cybersecurity Fundamentals










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Cybersecurity Fundamentals
Course
Cybersecurity Fundamentals

Document information

Uploaded on
May 13, 2025
Number of pages
26
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Title: Cybersecurity Fundamentals – Practice Test with Answers |
DoD & CompTIA-Aligned Concepts | Complete 80-Question Set




1. If you suspect that your computer is infected with fake antivirus software,
what is the best immediate action to take?

Reboot the computer without taking any action.

Ignore the alerts and continue using the computer.

Install additional antivirus programs to combat the issue.

Uninstall the suspicious software and run a legitimate antivirus
scan.

2. If an organization requires personnel to have IAM level III certification,
which of the following actions should they take regarding training and
certification?

Focus solely on practical experience without any formal
certification requirements.

Ensure that personnel obtain the Security+ certification as part
of their training for IAM level III.

Only provide training on advanced cybersecurity topics without
focusing on certifications.

Require personnel to have no certifications for IAM level III roles.

3. According to AR 25-2, who is responsible for ensuring that users receive
initial and annual IA awareness training?

CISO

,End Users

IASO

System Administrator

, 4. Describe the differences between viruses, worms, and Trojan horses in
terms of their behavior and impact on computer systems.

Viruses are self-replicating, worms require user action, and Trojan
horses are harmless.

Viruses are used for data encryption, worms for network attacks,
and Trojan horses for system monitoring.

Viruses attach themselves to legitimate programs, worms
replicate independently, and Trojan horses disguise themselves
as legitimate software.

All three types behave the same way and have the same impact.

5. If an organization fails to provide initial and annual IA awareness training
as mandated by AR 25-2, what potential consequences could arise?

Reduction in cybersecurity costs

Enhanced data encryption practices

Increased vulnerability to security incidents

Improved user compliance with security policies

6. If a company discovers a rootkit on its servers, what immediate action
should be taken to mitigate potential damage?

Increase the server's encryption levels without further
investigation.

Ignore the rootkit as it does not pose a threat.

Initiate an incident response plan to remove the rootkit and
assess the extent of the breach.

Reboot the servers to clear any temporary files.

7. Why is a denial-of-service attack (DoS attack) a threat to data availability?

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Lectjarnniey Chamberlain College Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
72
Member since
2 year
Number of followers
43
Documents
3107
Last sold
1 week ago
Your Success, Our Blueprint

Your Success, Our Blueprint

4.3

13 reviews

5
8
4
3
3
1
2
0
1
1

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions