Ohio Cybersecurity Technician Level 1 Exam Practice Questions And Correct Answers (Verified Answers) Plus Rationales 2025|2026 Q&A | Instant Download Pdf
- Which of the following best describes the CIA triad?
- Control, Integrity, Analysis
- Confidentiality, Integrity, Availability
- Confidentiality, Information, Authentication
- Control, Identity, Accessibility
- Which protocol secures web traffic using encryption?
Ensures protection of data privacy, accuracy, and access continuity.
A. FTP
B. HTTP
C. HTTPS 1 / 3
D. SNMP
HTTPS uses TLS/SSL to protect data in transit.
- A firewall primarily operates at which OSI layer?
- Layer 2
- Layer 3
- Layer 5
- Layer 7
- What is the main goal of phishing attacks?
- To damage hardware
- To overload servers
- To obtain sensitive information
- To encrypt drives
- Which device converts private IP addresses to public ones?
- Switch
- Router using NAT
- Bridge
- Hub
Network layer handles IP filtering and routing decisions.
Phishing tricks users into revealing credentials or data.
Network Address Translation enables internal hosts to reach the internet securely.
6. A strong password policy should include:
- Only letters 2 / 3
- Only numbers
- Complexity and expiration
- User’s birth date
- Which malware replicates itself without user action?
- Worm
- Trojan
- Spyware
- Adware
- Which port does HTTPS use by default?
- 20
- 21
- 80
Complexity, length, and periodic change reduce brute-force risk.
Worms spread autonomously across networks.
D. 443
Port 443 is reserved for TLS/SSL-encrypted web traffic.
9. The main purpose of a DMZ in network architecture is to:
- Speed up internal traffic
- Isolate public-facing servers from internal networks
- Store confidential files
- Control physical access
- / 3
DMZ separates external services from private infrastructure.