Cybersecurity
Latest uploads at Cybersecurity. Looking for notes at Cybersecurity? We have lots of notes, study guides and study notes available for your school.
-
192
- 0
-
14
All courses for Cybersecurity
-
Cybersecurity 180
-
Cybersecurity / 2
Latest content Cybersecurity
Cyber Security Cert Test (QUESTIONS WITH 100% CORRECT ANSWERS 
Which of the following terms indicates that information is to be read only by those people for whom it is intended 
 
Confidentiality 
Integrity 
Availability 
Accounting 
Confidentiality 
 
 
What technology is used to implement confidentiality 
auditing 
 
 
Which of the following makes sure that data is not changed when it not supposed 
 
Confidentiality 
Integrity 
Availability 
Accounting 
integrity 
 
 
Which of the following ...
- Exam (elaborations)
- • 7 pages's •
-
Cybersecurity•Cybersecurity
Preview 2 out of 7 pages
Getting your document ready...
Cyber Security Cert Test (QUESTIONS WITH 100% CORRECT ANSWERS 
Which of the following terms indicates that information is to be read only by those people for whom it is intended 
 
Confidentiality 
Integrity 
Availability 
Accounting 
Confidentiality 
 
 
What technology is used to implement confidentiality 
auditing 
 
 
Which of the following makes sure that data is not changed when it not supposed 
 
Confidentiality 
Integrity 
Availability 
Accounting 
integrity 
 
 
Which of the following ...
ISC Certified in Cybersecurity Complete Questions with 100% Correct Answers 
Which of the following can be used to map data flows through an organization and the relevant security controls used at each point along the way? (D5.1, L5.1.1) 
a. Encryption 
b. Hashing 
c. Hard Copy 
d. Data Life Cycle 
Data Life Cycle 
 
 
Why is an asset inventory so important? 
a. It tells you what to encrypt 
b. You can't protect what you don't know you have 
c. The law requires it 
d. It contains a price list ...
- Package deal
- Exam (elaborations)
- • 17 pages's •
-
Cybersecurity•Cybersecurity
-
Complete Cyber Security Exam Bundle Latest 2024!!!• By ACADEMICAIDSTORE
Preview 3 out of 17 pages
Getting your document ready...
ISC Certified in Cybersecurity Complete Questions with 100% Correct Answers 
Which of the following can be used to map data flows through an organization and the relevant security controls used at each point along the way? (D5.1, L5.1.1) 
a. Encryption 
b. Hashing 
c. Hard Copy 
d. Data Life Cycle 
Data Life Cycle 
 
 
Why is an asset inventory so important? 
a. It tells you what to encrypt 
b. You can't protect what you don't know you have 
c. The law requires it 
d. It contains a price list ...
ISC Certified in Cybersecurity Complete Questions with 100% Correct Answers 
Adequate Security 
Security commensurate with the risk and the magnitude of harm resulting from the loss, misuse or unauthorized access to or modification of information. 
 
 
Administrative Controls 
Controls implemented through policy and procedures. Often enforced in conjunction with physical and/or technical controls, such as an access-granting policy for new users that requires login and approval by the hiring mana...
- Package deal
- Exam (elaborations)
- • 16 pages's •
-
Cybersecurity•Cybersecurity
-
Complete Cyber Security Exam Bundle Latest 2024!!!• By ACADEMICAIDSTORE
Preview 3 out of 16 pages
Getting your document ready...
ISC Certified in Cybersecurity Complete Questions with 100% Correct Answers 
Adequate Security 
Security commensurate with the risk and the magnitude of harm resulting from the loss, misuse or unauthorized access to or modification of information. 
 
 
Administrative Controls 
Controls implemented through policy and procedures. Often enforced in conjunction with physical and/or technical controls, such as an access-granting policy for new users that requires login and approval by the hiring mana...
(ISC)2 Certified in Cybersecurity Final Exam (QUESTIONS WITH 100% CORRECT ANSWERS 
Document specific requirements that a customer has about any aspect of a vendor's service performance. 
 
A) DLR 
B) Contract 
C) SLR 
D) NDA 
C) SLR (Service-Level Requirements) 
 
 
_________ identifies and triages risks. 
Risk Assessment 
 
 
_________ are external forces that jeopardize security. 
Threats 
 
 
_________ are methods used by attackers. 
Threat Vectors 
 
 
_________ are the combination of a th...
- Package deal
- Exam (elaborations)
- • 70 pages's •
-
Cybersecurity•Cybersecurity
-
Complete Cyber Security Exam Bundle Latest 2024!!!• By ACADEMICAIDSTORE
Preview 4 out of 70 pages
Getting your document ready...
(ISC)2 Certified in Cybersecurity Final Exam (QUESTIONS WITH 100% CORRECT ANSWERS 
Document specific requirements that a customer has about any aspect of a vendor's service performance. 
 
A) DLR 
B) Contract 
C) SLR 
D) NDA 
C) SLR (Service-Level Requirements) 
 
 
_________ identifies and triages risks. 
Risk Assessment 
 
 
_________ are external forces that jeopardize security. 
Threats 
 
 
_________ are methods used by attackers. 
Threat Vectors 
 
 
_________ are the combination of a th...
ITS Cybersecurity Practice Exam (QUESTIONS WITH 100% CORRECT ANSWERS 
A self-propagating malicious code that can propagate to other systems on the network and consume resources that could lead to a denial-of-service attack is called a _____. 
worm 
 
 
A computer malware code that replicates itself on the target computer and spreads through the network causing damage and distributing additional harmful payloads is called a _____. 
virus 
 
 
A program that appears to be useful or harmless but co...
- Package deal
- Exam (elaborations)
- • 15 pages's •
-
Cybersecurity•Cybersecurity
-
Complete Cyber Security Exam Bundle Latest 2024!!!• By ACADEMICAIDSTORE
Preview 2 out of 15 pages
Getting your document ready...
ITS Cybersecurity Practice Exam (QUESTIONS WITH 100% CORRECT ANSWERS 
A self-propagating malicious code that can propagate to other systems on the network and consume resources that could lead to a denial-of-service attack is called a _____. 
worm 
 
 
A computer malware code that replicates itself on the target computer and spreads through the network causing damage and distributing additional harmful payloads is called a _____. 
virus 
 
 
A program that appears to be useful or harmless but co...
ITS Cybersecurity (QUESTIONS WITH 100% CORRECT ANSWERS 
You are required to keep track of file access. 
Which type of auditing should be implemented? 
Object Access 
 
 
Object Access 
This determines attempts to access files and other objects. 
 
 
Process Tracking 
This determines events such as program activation and process exits. 
 
 
Directory Services 
This determines whether the operating system generates audit events when an AD DS object is accessed. 
 
 
Audit Logon 
This determines wh...
- Package deal
- Exam (elaborations)
- • 8 pages's •
-
Cybersecurity•Cybersecurity
-
Complete Cyber Security Exam Bundle Latest 2024!!!• By ACADEMICAIDSTORE
Preview 2 out of 8 pages
Getting your document ready...
ITS Cybersecurity (QUESTIONS WITH 100% CORRECT ANSWERS 
You are required to keep track of file access. 
Which type of auditing should be implemented? 
Object Access 
 
 
Object Access 
This determines attempts to access files and other objects. 
 
 
Process Tracking 
This determines events such as program activation and process exits. 
 
 
Directory Services 
This determines whether the operating system generates audit events when an AD DS object is accessed. 
 
 
Audit Logon 
This determines wh...
Cisco Cyber Security Exam 
It looks like an attacker has targeted a vulnerability in @Apollo's online messaging service, which is used to facilitate communications between employees working across different sites. When an employee makes a voice call, it floods the memory of the application, effectively giving the attacker control over the employee's device. What type of attack is this? 
Buffer overflow 
 
 
An employee received an email that looked like it came from an @Apollo supplier asking ...
- Package deal
- Exam (elaborations)
- • 18 pages's •
-
Cybersecurity•Cybersecurity
-
Complete Cyber Security Exam Bundle Latest 2024!!!• By ACADEMICAIDSTORE
Preview 3 out of 18 pages
Getting your document ready...
Cisco Cyber Security Exam 
It looks like an attacker has targeted a vulnerability in @Apollo's online messaging service, which is used to facilitate communications between employees working across different sites. When an employee makes a voice call, it floods the memory of the application, effectively giving the attacker control over the employee's device. What type of attack is this? 
Buffer overflow 
 
 
An employee received an email that looked like it came from an @Apollo supplier asking ...
Cyber Security Exam 
external security threats 
attacks originating from outside of an organization 
 
 
IoT 
global network of machines and devices capable of interacting with each other 
 
 
CIA triad 
Confidentiality, Integrity, Availability 
 
 
methods to ensure integrity 
file permissions, user access control, version control, and checksums 
 
 
motivation of black hat hacker 
taking advantage of any vulnerability for illegal personal gain 
 
 
ethics or morality 
difference between a whit...
- Package deal
- Exam (elaborations)
- • 4 pages's •
-
Cybersecurity•Cybersecurity
-
Complete Cyber Security Exam Bundle Latest 2024!!!• By ACADEMICAIDSTORE
Preview 1 out of 4 pages
Getting your document ready...
Cyber Security Exam 
external security threats 
attacks originating from outside of an organization 
 
 
IoT 
global network of machines and devices capable of interacting with each other 
 
 
CIA triad 
Confidentiality, Integrity, Availability 
 
 
methods to ensure integrity 
file permissions, user access control, version control, and checksums 
 
 
motivation of black hat hacker 
taking advantage of any vulnerability for illegal personal gain 
 
 
ethics or morality 
difference between a whit...
Cyber Security Exam Review 
Which of the following is a physical access control? 
A receptionist 
 
 
What is the most widely used first factor in a multi-factor authentication scheme? 
A password 
 
 
_________ is a major security tool that adds value to an object or to information. 
Exclusion 
 
 
Examine Figure CT-1 and determine which of the following security devices would be most 
effective in detecting intruders that circumvent the detectors on the exterior gates. 
An IR activated camera ...
- Package deal
- Exam (elaborations)
- • 9 pages's •
-
Cybersecurity•Cybersecurity
-
Complete Cyber Security Exam Bundle Latest 2024!!!• By ACADEMICAIDSTORE
Preview 2 out of 9 pages
Getting your document ready...
Cyber Security Exam Review 
Which of the following is a physical access control? 
A receptionist 
 
 
What is the most widely used first factor in a multi-factor authentication scheme? 
A password 
 
 
_________ is a major security tool that adds value to an object or to information. 
Exclusion 
 
 
Examine Figure CT-1 and determine which of the following security devices would be most 
effective in detecting intruders that circumvent the detectors on the exterior gates. 
An IR activated camera ...
Cyber Security Exam 
RANSOMWARE 
a form of malware that locks a computer or encrypts files, and therefore prevents a user from accessing their data unless they pay money (a ransom) 
 
 
BIOMETRIC 
Fingerprints and retinal images are examples of this type of information 
 
 
BLACK BOX TESTING 
A test of a computer system whereby an external cyber attack is simulated (the tester has no information about the system) 
 
 
CAPTCHA 
Technology intended to determine that a human, not a computer program...
- Package deal
- Exam (elaborations)
- • 2 pages's •
-
Cybersecurity•Cybersecurity
-
Complete Cyber Security Exam Bundle Latest 2024!!!• By ACADEMICAIDSTORE
Preview 1 out of 2 pages
Getting your document ready...
Cyber Security Exam 
RANSOMWARE 
a form of malware that locks a computer or encrypts files, and therefore prevents a user from accessing their data unless they pay money (a ransom) 
 
 
BIOMETRIC 
Fingerprints and retinal images are examples of this type of information 
 
 
BLACK BOX TESTING 
A test of a computer system whereby an external cyber attack is simulated (the tester has no information about the system) 
 
 
CAPTCHA 
Technology intended to determine that a human, not a computer program...