Escrito por estudiantes que aprobaron Inmediatamente disponible después del pago Leer en línea o como PDF ¿Documento equivocado? Cámbialo gratis 4,6 TrustPilot
logo-home
Examen

CYB 1 – Introduction to Cybersecurity 2

Puntuación
-
Vendido
-
Páginas
24
Grado
A+
Subido en
17-03-2025
Escrito en
2024/2025

CYB 1 – Introduction to Cybersecurity 2

Institución
Introduction To Cybersecurity
Grado
Introduction to cybersecurity

Vista previa del contenido

1. What does "encryption" do in the context of cybersecurity?

A. Protects the data by making it unreadable to unauthorized users

B. Increases the speed of data transmission

C. Stores data in a cloud-based server

D. Backs up data to prevent loss

Answer: a) Protects the data by making it unreadable to unauthorized users

Rationale: Encryption transforms readable data into a format that cannot be easily

understood by unauthorized users without a decryption key.




2. What is a "Botnet"?

A. A network of infected computers controlled remotely by attackers

B. A system that protects networks from malicious attacks

C. A type of firewall that blocks all incoming traffic

D. A method of encrypting internet communications

Answer: a) A network of infected computers controlled remotely by attackers

Rationale: A botnet is a group of compromised computers that can be controlled

remotely to carry out malicious activities.




3. What does "Phishing" refer to in the context of cybersecurity?

A. A type of malware

,B. A technique to steal sensitive data by pretending to be a trustworthy entity

C. A method to encrypt data

D. A type of firewall

Answer: b) A technique to steal sensitive data by pretending to be a trustworthy entity

Rationale: Phishing involves using fraudulent communications (usually emails) to trick

users into providing sensitive information.




4. What is "Keylogging"?

A. A method of capturing network traffic for analysis

B. A technique used by attackers to record keystrokes on a victim's device

C. A method of encrypting sensitive information

D. A process for securely backing up data

Answer: b) A technique used by attackers to record keystrokes on a victim's device

Rationale: Keylogging involves tracking and recording the keys a user presses on their

keyboard, often used for stealing passwords or sensitive information.




5. Which of the following is the main purpose of "End-to-End Encryption"?

A. To ensure data remains encrypted while being transmitted between two parties

B. To prevent unauthorized users from accessing a website

C. To create backups of data

D. To protect physical hardware from theft

, Answer: a) To ensure data remains encrypted while being transmitted between two

parties

Rationale: End-to-end encryption protects data during transmission, ensuring that only

the sender and recipient can read it.




6. Which of the following is an example of a Denial of Service (DoS) attack?

A. Sending an excessive amount of traffic to overwhelm a server

B. Encrypting data and demanding payment for decryption

C. Gaining unauthorized access to a system

D. Stealing user credentials via phishing

Answer: a) Sending an excessive amount of traffic to overwhelm a server

Rationale: A DoS attack floods a system or network with excessive traffic, rendering it

unavailable to legitimate users.




7. What is the most common method for attackers to gain unauthorized access to a

system?

A. Exploiting software vulnerabilities

B. Using advanced hardware attacks

C. Gaining physical access to the system

D. Cracking strong passwords

Answer: a) Exploiting software vulnerabilities

Rationale: Many cyberattacks are successful due to vulnerabilities in software that

attackers can exploit.

Escuela, estudio y materia

Institución
Introduction to cybersecurity
Grado
Introduction to cybersecurity

Información del documento

Subido en
17 de marzo de 2025
Número de páginas
24
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$10.99
Accede al documento completo:

¿Documento equivocado? Cámbialo gratis Dentro de los 14 días posteriores a la compra y antes de descargarlo, puedes elegir otro documento. Puedes gastar el importe de nuevo.
Escrito por estudiantes que aprobaron
Inmediatamente disponible después del pago
Leer en línea o como PDF

Conoce al vendedor
Seller avatar
douglasmugwe82
5.0
(1)

Conoce al vendedor

Seller avatar
douglasmugwe82 Teachme2-tutor
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
2
Miembro desde
1 año
Número de seguidores
0
Documentos
4239
Última venta
5 meses hace
fully answered questions and answer

fully answered questions and answer

5.0

1 reseñas

5
1
4
0
3
0
2
0
1
0

Documentos populares

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes