Professional Documents
Culture Documents
IT Questions Bank IOS Command List CCNA » CCNA Security v2.0 » Cybersecurity »
Introduction to Cybersecurity
Answers
Module 1: Introduction to
Cybersecurity Quiz Answers
Introduction to
Cybersecurity: Course
Final Exam Answers
https://itexamanswers.net/introduction-to-cybersecurity-course-final-exam-answers.html 1/27
9/5/23, 2:42 PM Introduction to Cybersecurity: Course Final Exam Answers
Related Posts
1. Which of the following firewalls hides or masquerades the
Introduction to Cybersecurity Chapter
private addresses of network hosts? 3 Quiz Answers
https://itexamanswers.net/introduction-to-cybersecurity-course-final-exam-answers.html 2/27
9/5/23, 2:42 PM Introduction to Cybersecurity: Course Final Exam Answers
Scalability
Availability
Integrity
Confidentiality
https://itexamanswers.net/introduction-to-cybersecurity-course-final-exam-answers.html 3/27
9/5/23, 2:42 PM Introduction to Cybersecurity: Course Final Exam Answers
V
V EE R
R EE EE N
NV VO OU
UDD II G
G II T-T- II N
NKKO
OOOP
P
M
M EE TT D D EE LL LL P
PRR EE MM II EE R
R ..
Scalability
Integrity
Confidentiality
Availability
Intimidation
Brute force attack
Network sniffing
Rainbow tables
Social engineering
Spraying
Dictionary attack
7. Improper management of physical access to a resource,
such as a file, can lead to what type of security vulnerability?
https://itexamanswers.net/introduction-to-cybersecurity-course-final-exam-answers.html 4/27
9/5/23, 2:42 PM Introduction to Cybersecurity: Course Final Exam Answers
Contact information
Next appointment
Patient records
First and last name
10. You are surfing the Internet using a laptop at a public Wi-
Fi cafe. What should you check first before you connect to
the public network?
EC Council Certified Ethical Hacker
Microsoft Technology Associate Security Fundamentals
ISACA CSX Cybersecurity Fundamentals
CompTIA Security+
ISC2 Certified Information Systems Security Professional
https://itexamanswers.net/introduction-to-cybersecurity-course-final-exam-answers.html 6/27
9/5/23, 2:42 PM Introduction to Cybersecurity: Course Final Exam Answers
Ethical
Unethical
16. What is the main purpose of cyberwarfare?
Shell shock
WannaCry
NotPetva
Spectre
Meltdown
Buffer overflow
Race conditions
Weaknesses in security practices
Non-validated input
Access control problems
Open authorization
VPN service
Password manager
In-private browsing mode3
Fingerprint
Phone
Credit card
Voice recognition
Fob
Ethical
Unethical
26. Which of the following is an entry-level certification for
newcomers who are preparing to start their career in
cybersecurity?
CompTIA Security+
Microsoft Technology Associate Security Fundamentals
ISC2 Certified Information Systems Security Professional
ISACA CSX Cybersecurity Fundamentals
EC Council Certified Ethical Hacker
Palo Alto Networks Certified Cybersecurity Associate
https://itexamanswers.net/introduction-to-cybersecurity-course-final-exam-answers.html 10/27
9/5/23, 2:42 PM Introduction to Cybersecurity: Course Final Exam Answers
True
False
https://itexamanswers.net/introduction-to-cybersecurity-course-final-exam-answers.html 11/27
9/5/23, 2:42 PM Introduction to Cybersecurity: Course Final Exam Answers
29. An employee is laid off after fifteen years with the same
organization. The employee is then hired by another
organization within a week. In the new organization, the
employee shares documents and ideas for products that the
employee proposed at the original organization. Is the
employee’s behavior ethical or unethical?
Ethical
Unethical
Blockchain
Table
Ledger
Spreadsheet
https://itexamanswers.net/introduction-to-cybersecurity-course-final-exam-answers.html 12/27
9/5/23, 2:42 PM Introduction to Cybersecurity: Course Final Exam Answers
Storage
Text
ASCII
Transmission
Binary
Processing
True
False
https://itexamanswers.net/introduction-to-cybersecurity-course-final-exam-answers.html 13/27
9/5/23, 2:42 PM Introduction to Cybersecurity: Course Final Exam Answers
Buffer overflow
Access control problems
Race conditions
Weaknesses in security practices
Non-validated input
Phishing
Adware
Social engineering
DDoS
Spyware
Zenmap
Port number
Sequence number
Nmap
https://itexamanswers.net/introduction-to-cybersecurity-course-final-exam-answers.html 14/27
9/5/23, 2:42 PM Introduction to Cybersecurity: Course Final Exam Answers
True
False
Ethical
Unethical
https://itexamanswers.net/introduction-to-cybersecurity-course-final-exam-answers.html 15/27
9/5/23, 2:42 PM Introduction to Cybersecurity: Course Final Exam Answers
SEO poisoning
Man-in-the-Mobile
Ransomware
DDoS
Man-in-the-Middle
Worms
True
https://itexamanswers.net/introduction-to-cybersecurity-course-final-exam-answers.html 16/27
9/5/23, 2:42 PM Introduction to Cybersecurity: Course Final Exam Answers
False
Apple Pay
Google Pay
Near Field Communications
Cryptocurrency
Hacker network
Crime syndicate
Zombie
Botnet
https://itexamanswers.net/introduction-to-cybersecurity-course-final-exam-answers.html 17/27
9/5/23, 2:42 PM Introduction to Cybersecurity: Course Final Exam Answers
Phishing
Bluejacking
Cryptoransomware
Cryptojacking
Ethical
Unethical
True
False
54. In networking, what name is given to the identifier at both
ends of a transmission to ensure that the right data is
passed to the correct application?
IP address
https://itexamanswers.net/introduction-to-cybersecurity-course-final-exam-answers.html 18/27
9/5/23, 2:42 PM Introduction to Cybersecurity: Course Final Exam Answers
Port number
MAC address
Sequence number
True
False
NetFlow
Honeypot
IDS
Nmap
True
False
58. Which of the following certifications is aimed at high
school and early college students, as well as anyone
interested in a career change?
CompTIA Security+
Microsoft Technology Associate Security Fundamentals
https://itexamanswers.net/introduction-to-cybersecurity-course-final-exam-answers.html 19/27
9/5/23, 2:42 PM Introduction to Cybersecurity: Course Final Exam Answers
Firewalls
Guards
Camera
Policy and procedure
Technology
Awareness, training and education
True
False
https://itexamanswers.net/introduction-to-cybersecurity-course-final-exam-answers.html 20/27
9/5/23, 2:42 PM Introduction to Cybersecurity: Course Final Exam Answers
Spear phishing
Trojan horse
DDoS
SEO poisoning
https://itexamanswers.net/introduction-to-cybersecurity-course-final-exam-answers.html 21/27
9/5/23, 2:42 PM Introduction to Cybersecurity: Course Final Exam Answers
DDoS
Zero-day
Brute force
Port scans
True
False
https://itexamanswers.net/introduction-to-cybersecurity-course-final-exam-answers.html 22/27
9/5/23, 2:42 PM Introduction to Cybersecurity: Course Final Exam Answers
Spam
Phishing
Worm
Virus
Business continuity
Disaster recovery
Risk management
Vulnerability scanning
72. An employee is laid off after fifteen years with the same
organization. The employee is then hired by another
organization within a week. In the new organization, the
employee shares documents and ideas for products that the
employee proposed at the original organization.
Is the employee’s behavior ethical or unethical?
Ethical
Unethical
https://itexamanswers.net/introduction-to-cybersecurity-course-final-exam-answers.html 23/27
9/5/23, 2:42 PM Introduction to Cybersecurity: Course Final Exam Answers
Subscribe
25 COMMENTS
Question 1
This is a multiple choice question. Once you have
selected an option, select the submit button below
Several @Apollo employees have reported that the
network access is slow. After investigation, the network
administrator has learned that one employee downloaded
a third-party scanning program for the printer.
What type of malware might have been introduced that is
causing slow performance of the network?
Phishing
Worm
Spam
Virus
Reply View Replies (2)
shehroz 4 months ago
https://itexamanswers.net/introduction-to-cybersecurity-course-final-exam-answers.html 24/27
9/5/23, 2:42 PM Introduction to Cybersecurity: Course Final Exam Answers
Business continuity
Disaster recovery
Risk management
Vulnerability scanning
Reply View Replies (1)
True
False
Reply View Replies (1)
True
False
Reply View Replies (1)
https://itexamanswers.net/introduction-to-cybersecurity-course-final-exam-answers.html 25/27
9/5/23, 2:42 PM Introduction to Cybersecurity: Course Final Exam Answers
Host-based firewall
Reply View Replies (1)
Ethical
Unethical
Reply View Replies (1)
Host-based firewall
https://itexamanswers.net/introduction-to-cybersecurity-course-final-exam-answers.html 26/27
9/5/23, 2:42 PM Introduction to Cybersecurity: Course Final Exam Answers
Blockchain
Table
Ledger
Spreadsheet
Storage
Text
ASCII
Transmission
Binary
Processing
Reply View Replies (2)
https://itexamanswers.net/introduction-to-cybersecurity-course-final-exam-answers.html 27/27