• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

Exam Practice Questions And Correct

Exam (elaborations) Jan 1, 2026 ★★★★☆ (4.0/5)
Loading...

Loading document viewer...

Page 0 of 0

Document Text

Ohio Cybersecurity Technician Level 2 Exam Practice Questions And Correct Answers (Verified Answers) Plus Rationales 2025|2026 Q&A | Instant Download Pdf

  • Which protocol is used to securely transfer files over the internet?

A. FTP

B. TFTP

C. SFTP

D. SMTP

SFTP uses SSH to encrypt data during transfer, ensuring confidentiality and integrity.

  • Which type of malware disguises itself as legitimate software?
  • Worm
  • Trojan horse
  • Rootkit 1 / 3
  • Spyware
  • A Trojan horse appears legitimate but performs malicious actions once executed.

  • What is the primary goal of a DoS attack?
  • Deny availability of a service
  • Steal confidential data
  • Modify system files
  • Bypass authentication
  • DoS attacks flood or overload systems to prevent legitimate access.

  • Which device separates network segments to reduce broadcast traffic?
  • Hub
  • Repeater
  • Router
  • Modem
  • Routers separate broadcast domains and manage traffic between networks.

  • What is the strongest form of multi-factor authentication?
  • Password + PIN
  • Smart card + fingerprint
  • Password + security question
  • Username + password
  • Combining something you have (smart card) and something you are (biometric) offers high assurance. 2 / 3

  • Which attack involves intercepting and altering communication between
  • two parties?

  • SQL Injection
  • Man-in-the-Middle
  • Phishing
  • Smurf
  • MITM attacks intercept traffic to read or modify transmitted data.

  • What is the default port for HTTPS?
  • 20
  • 21

C. 443

D. 8080

HTTPS uses port 443 for encrypted web communication via SSL/TLS.

  • Which encryption algorithm is symmetric?

A. AES

B. RSA

C. ECC

D. DSA

AES uses one key for both encryption and decryption, classifying it as symmetric.

  • What is the main function of a firewall?
  • Control incoming and outgoing network traffic
  • Encrypt email
  • / 3

User Reviews

★★★★☆ (4.0/5 based on 1 reviews)
Login to Review
S
Student
May 21, 2025
★★★★☆

With its comprehensive coverage, this document helped me ace my presentation. Definitely a impressive choice!

Download Document

Buy This Document

$1.00 One-time purchase
Buy Now
  • Full access to this document
  • Download anytime
  • No expiration

Document Information

Category: Exam (elaborations)
Added: Jan 1, 2026
Description:

Ohio Cybersecurity Technician Level 2 Exam Practice Questions And Correct Answers (Verified Answers) Plus Rationales 2025|2026 Q&A | Instant Download Pdf 1. Which protocol is used to securely trans...

Unlock Now
$ 1.00