100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

CYBERSECURITY MIDTERM EXAM 300 QUESTIONS AND CORRECT ANSWERS EXAM GRADED A+

Puntuación
-
Vendido
-
Páginas
190
Grado
A+
Subido en
24-01-2026
Escrito en
2025/2026

CYBERSECURITY MIDTERM EXAM 300 QUESTIONS AND CORRECT ANSWERS EXAM GRADED A+

Institución
CYBERSECURITY
Grado
CYBERSECURITY











Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
CYBERSECURITY
Grado
CYBERSECURITY

Información del documento

Subido en
24 de enero de 2026
Número de páginas
190
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

CYBERSECURITY MIDTERM EXAM
300 QUESTIONS AND CORRECT
ANSWERS 2025\2026 EXAM GRADED
A+




You are a security expert asked to protect the webservers hosted in your building
from exposure to anyone other than server admins. Which of the following
physical security method should you implement to achieve this?


a.
Protected cable distribution


b.
Demilitarized zones


c.
Vault

,d.
Faraday cage - ANSWER- Demilitarized zones


Spectrum Technologies uses SHA-256 to share confidential information. The
enterprise reported a breach of confidential data by a threat actor. You are asked to
verify the cause of the attack that occurred despite implementing secure
cryptography in communication. Which type of attack should you consider first,
and why?


a.
Known ciphertext attack; the attacker can create the cryptographic keys from
ciphertext because of the SHA-256 algorithm.


b.
Downgrade attack; SHA-256 is vulnerable to downgrades in the operating system
to earlier versions, allowing threat actors to easily attack.


c.
Misconfiguration attack; the company should have configured a higher security
hash algorithm rather than using the less-secure SHA-256.


d.
Collision attacks; the threat actor has created a malicious file with the same digest
using SHA-256. - ANSWER- Misconfiguration attack; the company should
have configured a higher security hash algorithm rather than using the less-
secure SHA-256.


Maze must establish a communication channel between two data centers. After
conducting a study, she came up with the idea of establishing a wired connection

,between them since they have to communicate in unencrypted form. Considering
the security requirements, Maze proposed using an alarmed carrier PDS over a
hardened carrier PDS. Why would Maze make this suggestion in her proposal?


a.
Network speeds would be slowed too much if they used a hardened carrier PDS.


b.
Using a hardened carrier PDS would require someone to conduct periodic visual
inspections.


c.
Using a hardened carrier PDS would restrict their ability to transfer large amounts
of data.


d.
Data transmission between buildings wouldn't be possible if they used a hardened
carrier PDS. - ANSWER- Using a hardened carrier PDS would require
someone to conduct periodic visual inspections.


Which of the following statements correctly describes the disadvantage of a
hardware-based keylogger?


a.
A hardware-based keylogger can easily be detected in a network by an antivirus.


b.

, A hardware-based keylogger can be detected by an antivirus when it scans for
ports.


c.
A hardware-based keylogger must be physically installed and removed without
detection.


d.
A hardware-based keylogger's data can be easily erased by the antimalware
software installed in the device. - ANSWER- A hardware-based keylogger must
be physically installed and removed without detection.


Jane, an IT security expert whose services are sought by XYZ Company, has
recommended implementing CTR mode in the network. What is one requirement
that needs to be fulfilled for computers to communicate when the CTR mode is
implemented?


a.
Both sender and receiver should have access to a counter.


b.
Sender should have access to a counter.


c.
Receiver should have access to a counter.


d.
$33.53
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada


Documento también disponible en un lote

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
Anahsmith Walden University
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
18
Miembro desde
2 año
Número de seguidores
9
Documentos
1063
Última venta
1 mes hace

3.8

4 reseñas

5
2
4
1
3
0
2
0
1
1

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes