ITS CYBERSECURITY PRACTICE EXAM
A self-propagating malicious code that can propagate to other systems on
the network and consume resources that could lead to a denial-of-service
attack is called a _____.
worm
A computer malware code that replicates itself on the target computer and
spreads through the network causing damage and distributing additional
harmful payloads is called a _____.
virus
A program that appears to be useful or harmless but contains hidden code
that can compromise the target system on which it runs is called a _____.
2026/2027- ITS CYBERSECURITY PRACTICE EXAM.pdf Practice Questions Study Guide A&P Exam
,Page 2 of 57 ITS CYBERSECURITY PRACTICE EXAM ITS CYBERSECURITY PRACTICE EXAM.pdf
Trojan horse
What are the two classes of encryption algorithms? (Choose 2.)
Asymmetric
Symmetric
Which algorithm is a one-way mathematical function that is used to provide
data integrity?
SHA-2
Why is it important to block incoming IP broadcast addresses and reserved
private IP addresses from entering your network?
These types of addresses are easier to use for IP spoofing attacks.
2026/2027- ITS CYBERSECURITY PRACTICE EXAM.pdf Practice Questions Study Guide A&P Exam
,Page 3 of 57 ITS CYBERSECURITY PRACTICE EXAM ITS CYBERSECURITY PRACTICE EXAM.pdf
You are a junior cybersecurity analyst. An employee reports to you that her
laptop was stolen. For which three reasons should you escalate this event
to the Computer Security Incident Response Team (CSIRT)? (Choose 3.)
Potential network disruption or denial of service
Exposure of sensitive or confidential information
Unauthorized use of resources
Which classification of alert should be escalated to security investigators?
True positive
Which term refers to the combined sum of all potential threat vectors in
defense-in-depth security?
2026/2027- ITS CYBERSECURITY PRACTICE EXAM.pdf Practice Questions Study Guide A&P Exam
, Page 4 of 57 ITS CYBERSECURITY PRACTICE EXAM ITS CYBERSECURITY PRACTICE EXAM.pdf
Attack surface
You receive an email from your teacher that has a link to a class poll for a
pizza party. You click the link which takes you to the school portal to log in.
Later, you discover this was a phishing email and your credentials were
stolen. Which part of the CIA Triad was compromised in this attack?
Confidentiality
A major power surge occurs in the middle of making authorized changes to
the company payroll server which results in equipment failure. The
equipment is replaced and the data is restored from a previous, good
backup. Which part of the CIA Triad was preserved?
Availability
2026/2027- ITS CYBERSECURITY PRACTICE EXAM.pdf Practice Questions Study Guide A&P Exam