0% found this document useful (0 votes)
484 views16 pages

Cybersecurity Exam Questions Guide

This document contains a quiz with 16 multiple choice questions about cybersecurity topics such as encryption, malware, wireless network security, and privacy. The questions cover definitions of terms like integrity and asymmetric encryption, examples of threats like malware and rootkits, wireless network authentication and encryption methods, and privacy risks from tracking technologies.

Uploaded by

Shravan K G
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
484 views16 pages

Cybersecurity Exam Questions Guide

This document contains a quiz with 16 multiple choice questions about cybersecurity topics such as encryption, malware, wireless network security, and privacy. The questions cover definitions of terms like integrity and asymmetric encryption, examples of threats like malware and rootkits, wireless network authentication and encryption methods, and privacy risks from tracking technologies.

Uploaded by

Shravan K G
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

in LEARNING

Exam questions

Question 1 of 16

Protecting data from unauthorized modification is called:

Integrity

Confidentiality

Availability

Authentication
Question 2 of 16

Asymmetric encryption, also called encryption uses two keys, a public key and a private ke

publickey

conventional

symmetric

keyed

Question 3 of 16
Question 3 of 16

What can be embedded within an email to run malicious code when the user opens the email?

keys

streams

malware

bots
Question 4 of 16
A secure connection will be identified as HTTPS, which means any information that is sent between you and the web:

encrypted

uses ActiveX

contains an XML file

is a location service
Question 5 of 16

The two main types of encryption algorithms are symmetric and

asymmetric

XSS

binding

broadcast
Question 6 of 16

Unlike encryption, a function is one-way. It takes a variable length input and produces a fixed length o

block

stream

hash

keyed

uestinn 7 of 16
Question 7 of 16

encryption uses encryption to protect data on entire drives or logical volumes.

Binding

BitLocker Drive

Public Key

Stream
2urston B of 16

What do you call a colection of programs that can infiltrate a computer system, create a backdoor and rer

hacker to take administrator level control of the victim's


computer?

buffer overflow

honeynet

rootkit

RADIUS exploit
Question 9 of 16

On a wireless network use to ensure that only authorized client computers are able to access the wirelesUnetwo

MAC address filtering

sSID tuning

BSSID Broadcast

WEP conversion
ttTOn TU OT To

What tracks information on a user's viewing habits while on the internet, and then sends that information to a remot
the user's knowledge?

spyware

buffer overflow

RADIUS exploit

worm

Question 11 of 16
Question 11 of 16

The WiFi is a fake access point that is set up as an


open network as a trap to get you to join, with the &bjective of ste
credentials and other information.

brownie

X cookie

nugget

pineapple
Question 12 of 16
V
One of the ways to protect wireless traffic from prying eyes is by using a key, where all entities share the same key,s
password or pass phrase to secure the traffic between entities.

location

pre-shared

zone

third-party
Question 13 of 16

To prevent a WAP from appearing in the list of available wireless networks you should disable broadcast1ng the

WPA

BSSID

SSID

WEP Key
Question 14 of 16

A
A has the ability to spread through the network without any help froma transport agent.

worm

buffer overflow

Virus

RADIUS exploit
Question 15 of 16

A secure browser actively blocks trackers and C o o k i e s so that your browsinGis kept private

palm print

certificate

Zone

third-party
Question 16 of 16
What is something that might happen, is generally difficult to control, and
natural disasters?
can range from innocent mistakes

asset

threat

honeypot

spyware

You might also like