Escrito por estudiantes que aprobaron Inmediatamente disponible después del pago Leer en línea o como PDF ¿Documento equivocado? Cámbialo gratis 4,6 TrustPilot
logo-home
Examen

CYB 1 – Introduction to Cybersecurity 3

Puntuación
-
Vendido
-
Páginas
24
Grado
A+
Subido en
17-03-2025
Escrito en
2024/2025

CYB 1 – Introduction to Cybersecurity 3

Institución
Introduction To Cybersecurity
Grado
Introduction to cybersecurity

Vista previa del contenido

1. Which of the following is the main purpose of "End-to-End Encryption"?

A. To ensure data remains encrypted while being transmitted between two parties

B. To prevent unauthorized users from accessing a website

C. To create backups of data

D. To protect physical hardware from theft

Answer: a) To ensure data remains encrypted while being transmitted between two

parties

Rationale: End-to-end encryption protects data during transmission, ensuring that only

the sender and recipient can read it.




2. Which of the following is an example of "Multi-factor Authentication"?

A. Using a password and answering a security question

B. Using a password and a unique code sent to your phone

C. Using a password and an email verification link

D. Using a password and a fingerprint scan

Answer: b) Using a password and a unique code sent to your phone

Rationale: Multi-factor authentication (MFA) involves using more than one verification

method, such as something you know (password) and something you have (code sent

to a phone).




3. What does the term "Data Breach" refer to?

,A. The unauthorized access, acquisition, or disclosure of sensitive data

B. A network disruption caused by a denial-of-service attack

C. A legitimate access to protected data by an authorized user

D. A software vulnerability that has been patched

Answer: a) The unauthorized access, acquisition, or disclosure of sensitive data

Rationale: A data breach occurs when sensitive data is accessed or stolen by

unauthorized individuals.




4. What does "encryption" do in the context of cybersecurity?

A. Protects the data by making it unreadable to unauthorized users

B. Increases the speed of data transmission

C. Stores data in a cloud-based server

D. Backs up data to prevent loss

Answer: a) Protects the data by making it unreadable to unauthorized users

Rationale: Encryption transforms readable data into a format that cannot be easily

understood by unauthorized users without a decryption key.




5. What is the best practice when creating strong passwords?

A. Use only letters and numbers

B. Use long and complex passwords with a combination of letters, numbers, and

symbols

C. Use a password that is easy to remember

, D. Reuse passwords across multiple accounts for convenience

Answer: b) Use long and complex passwords with a combination of letters, numbers,

and symbols

Rationale: Complex passwords are more difficult for attackers to guess or crack,

enhancing security.




6. What is "Cryptojacking"?

A. A technique for stealing cryptocurrency wallets

B. A method of using infected computers to mine cryptocurrency without user consent

C. A way to store cryptocurrency securely

D. A method of encrypting files for ransom

Answer: b) A method of using infected computers to mine cryptocurrency without user

consent

Rationale: Cryptojacking involves hijacking the processing power of users' devices to

mine cryptocurrency without their consent.




7. Which of the following is a type of malware that spreads by replicating itself?

A. Trojan Horse

B. Virus

C. Spyware

D. Ransomware

Answer: b) Virus

Escuela, estudio y materia

Institución
Introduction to cybersecurity
Grado
Introduction to cybersecurity

Información del documento

Subido en
17 de marzo de 2025
Número de páginas
24
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$10.99
Accede al documento completo:

¿Documento equivocado? Cámbialo gratis Dentro de los 14 días posteriores a la compra y antes de descargarlo, puedes elegir otro documento. Puedes gastar el importe de nuevo.
Escrito por estudiantes que aprobaron
Inmediatamente disponible después del pago
Leer en línea o como PDF

Conoce al vendedor
Seller avatar
douglasmugwe82
5.0
(1)

Conoce al vendedor

Seller avatar
douglasmugwe82 Teachme2-tutor
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
2
Miembro desde
1 año
Número de seguidores
0
Documentos
4239
Última venta
5 meses hace
fully answered questions and answer

fully answered questions and answer

5.0

1 reseñas

5
1
4
0
3
0
2
0
1
0

Documentos populares

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes