100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

CS102: COMPUTER SCIENCE 102: INTRODUCTION TO COMPUTER SCIENCE & ADVANCED COMPUTER SCIENCE TOPICS | 50 COMPREHENSIVE QUESTIONS & CORRECT ANSWERS (LATEST 2025/2026)

Rating
-
Sold
-
Pages
18
Grade
A+
Uploaded on
11-11-2025
Written in
2025/2026

CS102: COMPUTER SCIENCE 102: INTRODUCTION TO COMPUTER SCIENCE & ADVANCED COMPUTER SCIENCE TOPICS | 50 COMPREHENSIVE QUESTIONS & CORRECT ANSWERS (LATEST 2025/2026) Question no 1: You are using a public Wi-Fi network inside a coffee shop. Before surfing the web, you use your VPN to prevent intruders from sniffing your traffic. If you did not have a VPN, how would you identify whether someone is performing an ARP spoofing attack on your laptop? You should use netstat to check for any suspicious connections with another IP address within the LAN. You should check your ARP table and see if there is one IP address with two different MAC addresses. You cannot identify such an attack and must use a VPN to protect your traffic. You should scan the network using Nmap to check the MAC addresses of all the hosts and look for duplicates. Question no 2: Which of the following tactics uses malicious code to redirect users’ web traffic? Pharming Spimming Phishing Spear-phishing Question no 3: Which Nmap switch helps evade IDS or firewalls? -T -n/-R -oN/-oX/-oG -D Question no 4: When considering how an attacker may exploit a web server, what is web server footprinting? When an attacker gathers system-level data, including account details and server names When an attacker uses a brute-force attack to crack a web-server password When an attacker creates a complete profile of the site’s external links and file structures When an attacker implements a vulnerability scanner to identify weaknesses Question no 5: everox Solutions hired Arnold, a security professional, for the threat intelligence process. Arnold collected information about specific threats against the organization. From this information, he retrieved contextual information about security events and incidents that helped him disclose potential risks and gain insight into attacker methodologies. He collected the information from sources such as humans, social media, and chat rooms as well as from events that resulted in cyberattacks. In this process, he also prepared a report that includes identified malicious activities, recommended courses of action, and warnings for emerging attacks. What is the type of threat intelligence collected by Arnold in the above scenario? Operational threat intelligence Tactical threat intelligence Technical threat intelligence Strategic threat intelligence Question no 6: Larry, a security professional in an organization, has noticed some abnormalities in the user accounts on a web server. To thwart evolving attacks, he decided to harden the security of the web server by adopting a few countermeasures to secure the accounts on the web server. Which of the following countermeasures must Larry implement to secure the user accounts on the web server? Enable all non-interactive accounts that should exist but do not require interactive login Limit the administrator or root-level access to the minimum number of users Enable unused default user accounts created during the installation of an OS Retain all unused modules and application extensions Question no 7: Attacker Steve targeted an organization’s network with the aim of redirecting the company’s web traffic to another malicious website. To achieve this goal, Steve performed DNS cache poisoning by exploiting the vulnerabilities in the DNS server software and modified the original IP address of the target website to that of a fake website. What is the technique employed by Steve to gather information for identity theft? Pretexting Wardriving Skimming Pharming Question no 8: Eric, a cloud security engineer, implements a technique for securing the cloud resources used by his organization. This technique assumes by default that a user attempting to access the network is not an authentic entity and verifies every incoming connection before allowing access to the network. Using this technique, he also imposed conditions such that employees can access only the resources required for their role.

Show more Read less










Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
November 11, 2025
Number of pages
18
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CS102: COMPUTER SCIENCE 102: INTRODUCTION
TO COMPUTER SCIENCE & ADVANCED COMPUTER
SCIENCE TOPICS | 50 COMPREHENSIVE QUESTIONS
& CORRECT ANSWERS (LATEST 2025/2026)

Question no 1:
You are using a public Wi-Fi network inside a coffee shop. Before surfing the web, you use

your VPN to prevent intruders from sniffing your traffic. If you did not have a VPN, how

would you identify whether someone is performing an ARP spoofing attack on your laptop?

You should use netstat to check for any suspicious connections with another IP address within the
LAN.

You should check your ARP table and see if there is one IP address with two different MAC
addresses.

You cannot identify such an attack and must use a VPN to protect your traffic.

You should scan the network using Nmap to check the MAC addresses of all the hosts and look for

duplicates.



Question no 2:
Which of the following tactics uses malicious code to redirect users’ web traffic?
Pharming

Spimming

Phishing

Spear-phishing


Question no 3:
Which Nmap switch helps evade IDS or firewalls?
-T

-n/-R

-oN/-oX/-oG

-D

,Question no 4:
When considering how an attacker may exploit a web server, what is web server

footprinting?
When an attacker gathers system-level data, including account details and server names

When an attacker uses a brute-force attack to crack a web-server password

When an attacker creates a complete profile of the site’s external links and file structures

When an attacker implements a vulnerability scanner to identify weaknesses



Question no 5:
everox Solutions hired Arnold, a security professional, for the threat intelligence process.

Arnold collected information about specific threats against the organization. From this

information, he retrieved contextual information about security events and incidents that

helped him disclose potential risks and gain insight into attacker methodologies. He collected

the information from sources such as humans, social media, and chat rooms as well as from

events that resulted in cyberattacks. In this process, he also prepared a report that includes

identified malicious activities, recommended courses of action, and warnings for emerging

attacks.

What is the type of threat intelligence collected by Arnold in the above scenario?

Operational threat intelligence

Tactical threat intelligence

Technical threat intelligence

Strategic threat intelligence



Question no 6:
Larry, a security professional in an organization, has noticed some abnormalities in the user

accounts on a web server. To thwart evolving attacks, he decided to harden the security of

the web server by adopting a few countermeasures to secure the accounts on the web server.

Which of the following countermeasures must Larry implement to secure the user accounts

on the web server?

Enable all non-interactive accounts that should exist but do not require interactive login

Limit the administrator or root-level access to the minimum number of users

Enable unused default user accounts created during the installation of an OS

, Retain all unused modules and application extensions



Question no 7:
Attacker Steve targeted an organization’s network with the aim of redirecting the company’s

web traffic to another malicious website. To achieve this goal, Steve performed DNS cache

poisoning by exploiting the vulnerabilities in the DNS server software and modified the

original IP address of the target website to that of a fake website.

What is the technique employed by Steve to gather information for identity theft?

Pretexting

Wardriving

Skimming

Pharming



Question no 8:
Eric, a cloud security engineer, implements a technique for securing the cloud resources used

by his organization. This technique assumes by default that a user attempting to access the

network is not an authentic entity and verifies every incoming connection before allowing

access to the network. Using this technique, he also imposed conditions such that employees

can access only the resources required for their role.

What is the technique employed by Eric to secure cloud resources?

Demilitarized zone

Serverless computing

Container technology

Zero trust network



Question no 9:
Calvin, a software developer, uses a feature that helps him auto-generate the content of a

web page without manual involvement and is integrated with SSI directives. This leads to a

vulnerability in the developed web application as this feature accepts remote user inputs and

uses them on the page. Hackers can exploit this feature and pass malicious SSI directives as

input values to perform malicious activities such as modifying and erasing server files.

What is the type of injection attack Calvin’s web application is susceptible to?

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Studyacesmart Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
3048
Member since
11 months
Number of followers
36
Documents
1578
Last sold
1 day ago
professional academic Tutor

As trusted professional working as study material sourcing agents, We offer authentic exam papers directly sourced from reputable institutions, (with genuine copyright) Our papers serve as invaluable tools to aid aspiring nurses and many other professions in their exam preparations. Backed by Our experience and expertise, We ensure that each paper is meticulously crafted. NOTE!! Supper Discounted, Comprehensive Bundle Packages with Seamless Content, Tailored to Summarize & Perfect each Subject. STUDY LESS STUDY SMART.

Read more Read less
4.2

554 reviews

5
277
4
175
3
68
2
22
1
12

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions