• wonderlic tests
  • EXAM REVIEW
  • NCCCO Examination
  • Summary
  • Class notes
  • QUESTIONS & ANSWERS
  • NCLEX EXAM
  • Exam (elaborations)
  • Study guide
  • Latest nclex materials
  • HESI EXAMS
  • EXAMS AND CERTIFICATIONS
  • HESI ENTRANCE EXAM
  • ATI EXAM
  • NR AND NUR Exams
  • Gizmos
  • PORTAGE LEARNING
  • Ihuman Case Study
  • LETRS
  • NURS EXAM
  • NSG Exam
  • Testbanks
  • Vsim
  • Latest WGU
  • AQA PAPERS AND MARK SCHEME
  • DMV
  • WGU EXAM
  • exam bundles
  • Study Material
  • Study Notes
  • Test Prep

FREE AND STUDY GAMES ABOUT CYBER SECURITY EXAM

Class notes Jan 11, 2026
Preview Mode - Purchase to view full document
Loading...

Loading study material viewer...

Page 0 of 0

Document Text

PDF Download

FREE AND STUDY GAMES ABOUT CYBER SECURITY EXAM

QUESTIONS

Actual Qs and Ans Expert-Verified Explanation

This Exam contains:

-Guarantee passing score -529 Questions and Answers -format set of multiple-choice -Expert-Verified Explanation

Question 1: encryption

Answer:

the process of changing information using an algorithm (or cipher) into another form that is unreadable by others - unless they possess the key to that data

Question 2: integrity

Answer:

only authorized users can change information. Data is accurate and Valid

Question 3: Remote Access Service (RAS)

Answer:

A networking Service that allows incoming connections from remote Dial-in Clients.

Question 4: Chain of custody

Answer:

Documents

Question 5: directory traversal

Answer:

aka the ../ attack. A method of accessing unauthorized parent directories

Question 6: Null session

Answer:

when used by an attacker, a malicious connection to the windows interprocess communications share

(IPC$)

Question 7: cryptographic hash

Answer:

algorithm that converts a large amount of data to a single long number, that is unlikely to be duplicated.

Question 8: downgrade attack

Answer:

when a protocol is downgraded from the current version to a previous version, exploiting backward compatibility

Question 9: Dictionary Attack

Answer:

A password attack that uses a prearranged list of likely words, trying them out one at a time

Question 10: piggybacking

Answer:

when an unauthorized person tags along with an authorized person to a restricted area

Question 11: time of day restriction

Answer:

when a user's logon hours are configured to restrict access to the network during certain times of the day and week

Question 12: Adware

Answer:

Type of spyware that pops up advertisements based on what it has learned about the user.

Question 13: discretionary access control (DAC)

Answer:

An access control policy generally determined by the owner

Question 14: static NAT

Answer:

when a single private IP address translates to a single public IP address

Question 15: ad filtering

Answer:

ways of blocking and filtering out unwanted advertisments, pop up blockers, and content filters are considered to be ad filtering methods

Question 16: web application firewall (WAF)

Answer:

an application firewall used to protect servers (and their client sessions) from XSS and SQL injection, among other attacks, during HTTP sessions

Question 17: User Domain

Answer:

the people who access and organization's information system

Question 18: black hat

Answer:

a hacker that breaks into a computer system without permission with the express purpose of theft

Question 19: grayware

Answer:

a general term used to describe applications that are behaving improperly but without serious

consequences: usually spyware

Question 20: transport layer security

Answer:

the successor to SSL, provides secure internet communications. This is shown in a browser at HTTPS

Question 21: Risk transference

Answer:

The transfer or outsourcing of risk to a third party i.e. insurance or risk sharing

Question 22: 802.1X

Answer:

An Authentification technology used to connect devices to a LAN or WLAN. It is an example of port based network access controls (NAC)

Question 23: Internet Content Filter

Answer:

a filter that is usually applied as software at the application layer and can filter out various types of internet activities

Question 24: Risk Assessment

Answer:

the attempt to determine the number of threats or hazards that could possibly occur in a given amount of time to computers/networks.

Question 25: Triple DES (3DES)

Answer:

Similar to DES but applies to the cipher algorithm three times to each cipher block

Question 26: Uptime

Answer:

total amount of time a system, application, and data are accessible. Often represented as a percentage of time available

Question 27: Terminal Access Controller Access-Control System Plus (TACACS+)

Answer:

A remote authentication protocol similar to RADIUS used in CISCO networks

Question 28: proxy auto-configuration (PAC)

Answer:

a file in web browsers that automatically chooses the appropriate proxy server.

Download Study Material

Buy This Study Material

$11.99
Buy Now
  • Immediate download after payment
  • Available in the pdf format
  • 100% satisfaction guarantee

Study Material Information

Category: Class notes
Description:

PDF Download FREE AND STUDY GAMES ABOUT CYBER SECURITY EXAM QUESTIONS Actual Qs and Ans Expert-Verified Explanation This Exam contains: -Guarantee passing score -529 Questions and Answers -format s...

UNLOCK ACCESS $11.99