100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

CYBER SECURITY QUALIFIED QUESTIONS AND ANSWERS -1.

Rating
-
Sold
-
Pages
12
Grade
A+
Uploaded on
06-11-2025
Written in
2025/2026

CYBER SECURITY QUALIFIED QUESTIONS AND ANSWERS -1.

Institution
CyberSecurity Certified
Course
CyberSecurity Certified









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
CyberSecurity Certified
Course
CyberSecurity Certified

Document information

Uploaded on
November 6, 2025
Number of pages
12
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CYBER SECURITY QUALIFIED QUESTIONS AND ANSWERS #1
Instant Message - correct answer Common communication using a computer


ICMP - correct answer Internet Control Message Protocol. Used by a router to exchange
information with other routers


Configuration Management - correct answer The process of keeping track of changes to the
system, if needed, approving them.


Packet Sniffer - correct answer A device or program that monitors the data traveling between
computers on a network


Gateway - correct answer A bridge two networks


Keywords - correct answer will block any website that to deal with certain predetermined
keywords


Risk Analysis - correct answer The process of identifying security risks, determining their
magnitude, and identifying areas needing safeguards


Packet Filtering or Packet Purity - correct answer analyzed against a set of filters. That make it
through the filters are sent to the requesting system and others are discarded


Telnet - correct answer used to perform commands on a remote computers


Spyware - correct answer any software using someone's Internet connection in the background
without their knowledge or explicit permission. These applications are typically bundled as a
hidden component of freeware or shareware programs that can be downloaded from the
Internet; however, it should be noted that majority of shareware and freeware do not come
with this. Once installed, this monitors user activity on the Internet and transmits that



ATTEMPT ALL QUESTIONS

, information in the background to someone else. IT can also gather information about e-mail
addresses and even passwords and credit card numbers.


SMTP Session Hijacking - correct answer by gaining access to a list of e-mail addresses a person
can send spam to thousands of users


Distributed Tool - correct answer A tool that can be distributed to multiple hosts, which can
then be coordinated to anonymously perform an attack on the target host simultaneously after
some time delay


Operation Controls - correct answer Security methods that focus on mechanisms that primarily
are implemented and executed by people (as opposed to systems)


Encryptions - correct answer the translation of data into a secret code; the most effective way
to achieve data security. To read these files, you must have access to a secret key or password
that enables you to decrypt it


Audit Trail - correct answer A record showing who has accessed a computer system and what
operations he or she has performed during a given period of time. Useful both for maintaining
security and for recovering lost transactions


Mobile Code - correct answer Software moduels obtained from remote systems, transferred
across a network, and then downloaded and executed on a local system without explicit
installation or execution by the recipient, Malicious types of this are designed, employed,
distributed, or activated with the intention of compromising the performance or security of
information systems and computers, increasing access to those systems disclosing unauthorized
information, corrupting information, denying service, or stealing resources.


Data Integrity - correct answer The state that exists when automated data is the same as that
in source documents, or has been correctly computed from source data, and has not been
exposed to alteration or destruction




ATTEMPT ALL QUESTIONS
$19.12
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
simonnjaramba

Also available in package deal

Thumbnail
Package deal
CYBER SECURITY REVISED QUESTIONS WITH CERTIFIED ANSWERS
-
16 2025
$ 176.24 More info

Get to know the seller

Seller avatar
simonnjaramba Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
New on Stuvia
Member since
2 months
Number of followers
0
Documents
113
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions