Escrito por estudiantes que aprobaron Inmediatamente disponible después del pago Leer en línea o como PDF ¿Documento equivocado? Cámbialo gratis 4,6 TrustPilot
logo-home
Examen

CYB 1 – Introduction to Cybersecurity 1

Puntuación
-
Vendido
-
Páginas
12
Grado
A+
Subido en
17-03-2025
Escrito en
2024/2025

CYB 1 – Introduction to Cybersecurity 1

Institución
Introduction To Cybersecurity
Grado
Introduction to cybersecurity

Vista previa del contenido

1. What is Cybersecurity?
A. Protecting computer systems from physical damage
B. Ensuring the security of information and systems on the internet
C. Building computer networks for businesses
D. Encrypting email communication
Answer: b) Ensuring the security of information and systems on the internet
Rationale: Cybersecurity focuses on protecting computer systems, networks, and
information from cyber threats and attacks.

2. Which of the following is NOT a primary goal of cybersecurity?
A. Confidentiality
B. Integrity
C. Profitability
D. Availability
Answer: c) Profitability
Rationale: The main goals of cybersecurity are confidentiality, integrity, and availability
(often referred to as the CIA triad), not profitability.

3. What does "Phishing" refer to in the context of cybersecurity?
A. A type of malware
B. A technique to steal sensitive data by pretending to be a trustworthy entity
C. A method to encrypt data
D. A type of firewall
Answer: b) A technique to steal sensitive data by pretending to be a trustworthy entity
Rationale: Phishing involves using fraudulent communications (usually emails) to trick
users into providing sensitive information.

4. What is a "firewall" used for in cybersecurity?
A. To monitor web traffic
B. To block unauthorized access to or from a private network
C. To encrypt data
D. To store backup copies of data
Answer: b) To block unauthorized access to or from a private network
Rationale: A firewall controls the incoming and outgoing network traffic based on
predetermined security rules.

5. Which of the following is a type of malware that spreads by replicating itself?
A. Trojan Horse
B. Virus
C. Spyware
D. Ransomware
Answer: b) Virus
Rationale: A virus is a type of malware that attaches itself to legitimate programs and
spreads when the program is executed.

6. What does "encryption" do in the context of cybersecurity?
A. Protects the data by making it unreadable to unauthorized users
B. Increases the speed of data transmission

, C. Stores data in a cloud-based server
D. Backs up data to prevent loss
Answer: a) Protects the data by making it unreadable to unauthorized users
Rationale: Encryption transforms readable data into a format that cannot be easily
understood by unauthorized users without a decryption key.

7. What is the term for the process of verifying the identity of a user or device?
A. Authorization
B. Authentication
C. Auditing
D. Encryption
Answer: b) Authentication
Rationale: Authentication is the process of verifying the identity of a user, device, or
system.

8. What is "Social Engineering" in cybersecurity?
A. Using advanced algorithms to protect data
B. Attacking systems via brute force
C. Manipulating people into divulging confidential information
D. Preventing unauthorized network access through technology
Answer: c) Manipulating people into divulging confidential information
Rationale: Social engineering involves manipulating individuals into revealing
confidential information or performing actions that compromise security.

9. Which of the following is an example of "two-factor authentication" (2FA)?
A. Using a password and a secret question
B. Using a password and a fingerprint scan
C. Using a password and an encryption key
D. Using a password and a username
Answer: b) Using a password and a fingerprint scan
Rationale: Two-factor authentication (2FA) requires two forms of identification, such as
something you know (password) and something you have (fingerprint).

10. What is the role of an "Antivirus" software?
A. To monitor network traffic for suspicious activity
B. To detect and remove malicious software (malware) from systems
C. To create a backup of important files
D. To manage user permissions and access control
Answer: b) To detect and remove malicious software (malware) from systems
Rationale: Antivirus software is designed to detect, quarantine, and remove malware
from computer systems.

11. Which of the following is an example of a Denial of Service (DoS) attack?
A. Sending an excessive amount of traffic to overwhelm a server
B. Encrypting data and demanding payment for decryption
C. Gaining unauthorized access to a system
D. Stealing user credentials via phishing
Answer: a) Sending an excessive amount of traffic to overwhelm a server
Rationale: A DoS attack floods a system or network with excessive traffic, rendering it
unavailable to legitimate users.

Escuela, estudio y materia

Institución
Introduction to cybersecurity
Grado
Introduction to cybersecurity

Información del documento

Subido en
17 de marzo de 2025
Número de páginas
12
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$10.99
Accede al documento completo:

¿Documento equivocado? Cámbialo gratis Dentro de los 14 días posteriores a la compra y antes de descargarlo, puedes elegir otro documento. Puedes gastar el importe de nuevo.
Escrito por estudiantes que aprobaron
Inmediatamente disponible después del pago
Leer en línea o como PDF

Conoce al vendedor
Seller avatar
douglasmugwe82
5.0
(1)

Conoce al vendedor

Seller avatar
douglasmugwe82 Teachme2-tutor
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
2
Miembro desde
1 año
Número de seguidores
0
Documentos
4239
Última venta
5 meses hace
fully answered questions and answer

fully answered questions and answer

5.0

1 reseñas

5
1
4
0
3
0
2
0
1
0

Documentos populares

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes