Ohio Cybersecurity Technician Level 2 Exam Practice Questions And Correct Answers (Verified Answers) Plus Rationales 2025|2026 Q&A | Instant Download Pdf
- Which protocol is used to securely transfer files over the internet?
A. FTP
B. TFTP
C. SFTP
D. SMTP
SFTP uses SSH to encrypt data during transfer, ensuring confidentiality and integrity.
- Which type of malware disguises itself as legitimate software?
- Worm
- Trojan horse
- Rootkit 1 / 3
- Spyware
- What is the primary goal of a DoS attack?
- Deny availability of a service
- Steal confidential data
- Modify system files
- Bypass authentication
- Which device separates network segments to reduce broadcast traffic?
- Hub
- Repeater
- Router
- Modem
- What is the strongest form of multi-factor authentication?
- Password + PIN
- Smart card + fingerprint
- Password + security question
- Username + password
A Trojan horse appears legitimate but performs malicious actions once executed.
DoS attacks flood or overload systems to prevent legitimate access.
Routers separate broadcast domains and manage traffic between networks.
Combining something you have (smart card) and something you are (biometric) offers high assurance. 2 / 3
- Which attack involves intercepting and altering communication between
- SQL Injection
- Man-in-the-Middle
- Phishing
- Smurf
- What is the default port for HTTPS?
- 20
- 21
two parties?
MITM attacks intercept traffic to read or modify transmitted data.
C. 443
D. 8080
HTTPS uses port 443 for encrypted web communication via SSL/TLS.
- Which encryption algorithm is symmetric?
A. AES
B. RSA
C. ECC
D. DSA
AES uses one key for both encryption and decryption, classifying it as symmetric.
- What is the main function of a firewall?
- Control incoming and outgoing network traffic
- Encrypt email
- / 3