100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

CISCO Cyber security Final Exam Questions and Answers

Rating
-
Sold
-
Pages
6
Grade
A+
Uploaded on
22-11-2025
Written in
2025/2026

CISCO Cyber security Final Exam Questions and Answers

Institution
Cyber Security Specialist
Course
Cyber Security Specialist









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Cyber Security Specialist
Course
Cyber Security Specialist

Document information

Uploaded on
November 22, 2025
Number of pages
6
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CISCO Cyber security Final Exam
Questions and Answers 2025-2026
Which two characteristics describe a worm? (Choose two.) - ANSWER-is self-
replicating and travels to new computers without any intervention or knowledge of the
user

In what way are zombies used in security attacks? - ANSWER-They are infected
machines that carry out a DDoS attack.

Which tool is used to provide a list of open ports on network devices? - ANSWER-Nmap

What is the most common goal of search engine optimization (SEO) poisoning? -
ANSWER-to increase web traffic to malicious sites

What is the purpose of a rootkit? - ANSWER-to gain privileged access to a device while
concealing itself

How can users working on a shared computer keep their personal browsing history
hidden from other workers that may use this computer? - ANSWER-Operate the web
browser in private browser mode.

What is the best method to prevent Bluetooth from being exploited? - ANSWER-Always
disable Bluetooth when it is not actively used.

A user is surfing the Internet using a laptop at a public WiFi cafe. What should be
checked first when the user connects to the public network? - ANSWER-if the laptop
requires user authentication for file and media sharing

Which configuration on a wireless router is not considered to be adequate security for a
wireless network? - ANSWER-prevent the broadcast of an SSID

A user is having difficulty remembering passwords for multiple online accounts. What is
the best solution for the user to try? - ANSWER-Save the passwords in a centralized
password manager program.

A network administrator is conducting a training session to office staff on how to create
a strong and effective password. Which password would most likely take the longest for
a malicious user to guess or break? - ANSWER-mk$$cittykat104#

A consumer would like to print photographs stored on a cloud storage account using a
third party online printing service. After successfully logging into the cloud account, the
customer is automatically given access to the third party online printing service. What

, allowed this automatic authentication to occur? - ANSWER-The cloud storage service is
an approved application for the online printing servicec

What is the motivation of a white hat attacker? - ANSWER-discovering weaknesses of
networks and systems to improve the security level of these systems

State-sponsored is too: - ANSWER-gather intelligence or commit sabotage on specific
goals on behalf of their government

Terrorists are people who: - ANSWER-make political statements, or create fear, by
causing physical or psychological damage to victims

Hacktivists are people who: - ANSWER-make political statements in order to create an
awareness of issues that are important to them

What are three methods that can be used to ensure confidentiality of information?
(Choose three.) - ANSWER-data encryption, username ID and password, two factor
authentication
What is a reason that internal security threats might cause greater damage to an
organization than external security threats? - ANSWER-Internal users have direct
access to the infrastructure devices.

What three items are components of the CIA triad? (Choose three.) - ANSWER-
availability, integrity, confidentiality

What is another name for confidentiality of information? - ANSWER-privacy

Which statement describes cyberwarfare? - ANSWER-It is Internet-based conflict that
involves the penetration of information systems of other nations.

Which method is used to check the integrity of data? - ANSWER-checksum

What is an example of "hacktivism"? - ANSWER-A group of environmentalists launch a
denial of service attack against an oil company that is responsible for a large oil spill.

The individual user profile on a social network site is an example of a/an
_________ identity. - ANSWER-online

What is the primary goal of a DoS attack? - ANSWER-to prevent the target server from
being able to handle additional requests

Which example illustrates how malware might be concealed? - ANSWER-An email is
sent to the employees of an organization with an attachment that looks like an antivirus
update, but the attachment actually consists of spyware.
$13.99
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
LeeErickson

Get to know the seller

Seller avatar
LeeErickson Chamberlain College Of Nursing
View profile
Follow You need to be logged in order to follow users or courses
Sold
2
Member since
8 months
Number of followers
0
Documents
1380
Last sold
2 months ago

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions