Escrito por estudiantes que aprobaron Inmediatamente disponible después del pago Leer en línea o como PDF ¿Documento equivocado? Cámbialo gratis 4,6 TrustPilot
logo-home
Examen

CYB 1 – Introduction to Cybersecurity 4

Puntuación
-
Vendido
-
Páginas
24
Grado
A+
Subido en
17-03-2025
Escrito en
2024/2025

CYB 1 – Introduction to Cybersecurity 4

Institución
Introduction To Cybersecurity
Grado
Introduction to cybersecurity

Vista previa del contenido

1. What is a "Backdoor" in cybersecurity?

A. A security flaw that can be exploited by attackers

B. A way for administrators to access systems remotely for maintenance

C. A method to encrypt and decrypt messages

D. A type of Trojan Horse used for remote control of systems

Answer: b) A way for administrators to access systems remotely for maintenance

Rationale: A backdoor is often a legitimate method of remote access for system

administrators but can be exploited by attackers if left unsecured.




2. What does the term "Zero-Day" refer to in cybersecurity?

A. A security flaw that has not been discovered

B. A vulnerability that has been patched by the vendor

C. A vulnerability that is exploited before it is known to the vendor

D. A type of malware that spreads automatically

Answer: c) A vulnerability that is exploited before it is known to the vendor

Rationale: A zero-day exploit occurs when a vulnerability is exploited before the vendor

or developer is aware of it.




3. What is Cybersecurity?

A. Protecting computer systems from physical damage

,B. Ensuring the security of information and systems on the internet

C. Building computer networks for businesses

D. Encrypting email communication

Answer: b) Ensuring the security of information and systems on the internet

Rationale: Cybersecurity focuses on protecting computer systems, networks, and

information from cyber threats and attacks.




4. What is the role of an "Antivirus" software?

A. To monitor network traffic for suspicious activity

B. To detect and remove malicious software (malware) from systems

C. To create a backup of important files

D. To manage user permissions and access control

Answer: b) To detect and remove malicious software (malware) from systems

Rationale: Antivirus software is designed to detect, quarantine, and remove malware

from computer systems.




5. What is the primary purpose of "Access Control" in cybersecurity?

A. To encrypt files for secure storage

B. To prevent unauthorized users from accessing resources

C. To monitor network traffic for intrusions

D. To generate user passwords automatically

Answer: b) To prevent unauthorized users from accessing resources

, Rationale: Access control mechanisms are used to restrict and control access to

sensitive information and resources based on user permissions.




6. What is "Social Engineering" in cybersecurity?

A. Using advanced algorithms to protect data

B. Attacking systems via brute force

C. Manipulating people into divulging confidential information

D. Preventing unauthorized network access through technology

Answer: c) Manipulating people into divulging confidential information

Rationale: Social engineering involves manipulating individuals into revealing

confidential information or performing actions that compromise security.




7. Which of the following is a type of malware that spreads by replicating itself?

A. Trojan Horse

B. Virus

C. Spyware

D. Ransomware

Answer: b) Virus

Rationale: A virus is a type of malware that attaches itself to legitimate programs and

spreads when the program is executed.




8. What is a "VPN" (Virtual Private Network) used for?

Escuela, estudio y materia

Institución
Introduction to cybersecurity
Grado
Introduction to cybersecurity

Información del documento

Subido en
17 de marzo de 2025
Número de páginas
24
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

$10.49
Accede al documento completo:

¿Documento equivocado? Cámbialo gratis Dentro de los 14 días posteriores a la compra y antes de descargarlo, puedes elegir otro documento. Puedes gastar el importe de nuevo.
Escrito por estudiantes que aprobaron
Inmediatamente disponible después del pago
Leer en línea o como PDF

Conoce al vendedor
Seller avatar
douglasmugwe82
5.0
(1)

Conoce al vendedor

Seller avatar
douglasmugwe82 Teachme2-tutor
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
2
Miembro desde
1 año
Número de seguidores
0
Documentos
4239
Última venta
5 meses hace
fully answered questions and answer

fully answered questions and answer

5.0

1 reseñas

5
1
4
0
3
0
2
0
1
0

Documentos populares

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes