Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CYBER 262 TEST 1 QUESTIONS WITH COMPLETE ANSWERS LATEST UPDATE 2026

Beoordeling
-
Verkocht
-
Pagina's
2
Cijfer
A+
Geüpload op
15-02-2026
Geschreven in
2025/2026

CYBER 262 TEST 1 QUESTIONS WITH COMPLETE ANSWERS LATEST UPDATE 2026 A computer virus, much like a flu virus, is designed to spread from host to host but does not have the ability to replicate itself. - Answers False A virus operates by inserting or attaching itself to a legitimate program or document that supports macros in order to execute its code. - Answers True Once a virus has successfully attached to a program, file, or document, the virus will lie dormant until circumstances cause the computer or device to execute its code. - Answers True Viruses can be spread through email and text message attachments, file downloads, and social media scam links. - Answers True A resident virus can take control when you start - or boot - your computer. - Answers False A direct action virus exploits the code of browsers and pages - if you access such a page, the virus can infect your computer. - Answers False A polymorphic virus changes its code each time an infected file is executed, it does this to evade antivirus programs. - Answers True A micro virus is written in the same micro language used for software applications - such viruses spread when you open an infected document, often through email attachments. - Answers False A multipartite virus inserts malicious code into executable files - files used to perform certain functions or operations on a system. - Answers False CVE, in the context of our lectures, is the acronym for... - Answers Common Vulnerabilities and Exposures CISA, in the context of our lectures, is the acronym for... - Answers Cybersecurity and Infrastructure Security Agency The CVE program serves as the world's central repository of detailed information about software vulnerabilities. - Answers True CNA, in the context of our lectures, is the acronym for... - Answers CVE Numbering Authority Security Controls, at a high level, are divided into the categories of controls - technical, managerial, operational, and physical. - Answers True Within the categories of controls are types of controls - deterrent, detective, corrective, compensating, and directive. - Answers True A script kiddie is someone who is highly skilled as a seasoned or professional hacker. - Answers False Hacktivists are motivated by financial gain. - Answers False Organized crime is usually motivated by monetary, control, espionage of some sort or even all of the above. - Answers True APT, in the context of our lectures, is the acronym for... - Answers Advanced Persistent Threat APT organizations are, typically, supported by nation states and used to go after high level targets. - Answers True An insider is someone who is inside an organization whether it be a company or a governmental entity. - Answers True Competitors are motivated by gaining some type of an advantage whether it be to put another company out of business or gain some type of an advantage for financial gain, speed to market, etc. - Answers True The Security Control category tells us what the control is actually doing. - Answers False The Security Control type tells us how the control is implemented. - Answers False Managerial Controls, also known as Administrative Controls, deal with policies, standards, risk assessments, background checks, regulatory compliance, and so forth. - Answers True Which of the following IS NOT an example of a Technical Control... - Answers Physical Security Drills Which of the following IS NOT an example of a Operational Control... - Answers Access Control Lists MFA, in the context of our lectures, is the acronym for... - Answers Multi-Factor Authentication ACL, in the context of our lectures, is the acronym for... - Answers Access Control List SAT, in the context of our lectures, is the acronym for... - Answers Security Awareness Training IDS, in the context of our lectures, is the acronym for... - Answers Intrusion Detection System IPS, in the context of our lectures, is the acronym for... - Answers Intrusion Prevention System Defense in Depth is a strategy that leverages multiple security measures to protect an organization's assets. - Answers True VPN, in the context of our lectures, is the acronym for... - Answers Virtual Private Network 2FA is the accepted acronym for Two-Factor Authentication. - Answers True

Meer zien Lees minder
Instelling
CYBER 262
Vak
CYBER 262

Voorbeeld van de inhoud

CYBER 262 TEST 1 QUESTIONS WITH COMPLETE ANSWERS LATEST UPDATE 2026

A computer virus, much like a flu virus, is designed to spread from host to host but does not have the
ability to replicate itself. - Answers False
A virus operates by inserting or attaching itself to a legitimate program or document that supports
macros in order to execute its code. - Answers True
Once a virus has successfully attached to a program, file, or document, the virus will lie dormant until
circumstances cause the computer or device to execute its code. - Answers True
Viruses can be spread through email and text message attachments, file downloads, and social media
scam links. - Answers True
A resident virus can take control when you start - or boot - your computer. - Answers False
A direct action virus exploits the code of browsers and pages - if you access such a page, the virus can
infect your computer. - Answers False
A polymorphic virus changes its code each time an infected file is executed, it does this to evade
antivirus programs. - Answers True
A micro virus is written in the same micro language used for software applications - such viruses
spread when you open an infected document, often through email attachments. - Answers False
A multipartite virus inserts malicious code into executable files - files used to perform certain
functions or operations on a system. - Answers False
CVE, in the context of our lectures, is the acronym for... - Answers Common Vulnerabilities and
Exposures
CISA, in the context of our lectures, is the acronym for... - Answers Cybersecurity and Infrastructure
Security Agency
The CVE program serves as the world's central repository of detailed information about software
vulnerabilities. - Answers True
CNA, in the context of our lectures, is the acronym for... - Answers CVE Numbering Authority
Security Controls, at a high level, are divided into the categories of controls - technical, managerial,
operational, and physical. - Answers True
Within the categories of controls are types of controls - deterrent, detective, corrective,
compensating, and directive. - Answers True
A script kiddie is someone who is highly skilled as a seasoned or professional hacker. - Answers False
Hacktivists are motivated by financial gain. - Answers False
Organized crime is usually motivated by monetary, control, espionage of some sort or even all of the
above. - Answers True
APT, in the context of our lectures, is the acronym for... - Answers Advanced Persistent Threat
APT organizations are, typically, supported by nation states and used to go after high level targets. -
Answers True
An insider is someone who is inside an organization whether it be a company or a governmental
entity. - Answers True
Competitors are motivated by gaining some type of an advantage whether it be to put another
company out of business or gain some type of an advantage for financial gain, speed to market, etc. -
Answers True
The Security Control category tells us what the control is actually doing. - Answers False
The Security Control type tells us how the control is implemented. - Answers False
Managerial Controls, also known as Administrative Controls, deal with policies, standards, risk
assessments, background checks, regulatory compliance, and so forth. - Answers True
Which of the following IS NOT an example of a Technical Control... - Answers Physical Security Drills
Which of the following IS NOT an example of a Operational Control... - Answers Access Control Lists
MFA, in the context of our lectures, is the acronym for... - Answers Multi-Factor Authentication
ACL, in the context of our lectures, is the acronym for... - Answers Access Control List
SAT, in the context of our lectures, is the acronym for... - Answers Security Awareness Training
IDS, in the context of our lectures, is the acronym for... - Answers Intrusion Detection System
IPS, in the context of our lectures, is the acronym for... - Answers Intrusion Prevention System
Defense in Depth is a strategy that leverages multiple security measures to protect an organization's
assets. - Answers True
VPN, in the context of our lectures, is the acronym for... - Answers Virtual Private Network
2FA is the accepted acronym for Two-Factor Authentication. - Answers True

Geschreven voor

Instelling
CYBER 262
Vak
CYBER 262

Documentinformatie

Geüpload op
15 februari 2026
Aantal pagina's
2
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$11.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
TutorJosh Chamberlain College Of Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
440
Lid sinds
1 jaar
Aantal volgers
16
Documenten
31724
Laatst verkocht
16 uur geleden
Tutor Joshua

Here You will find all Documents and Package Deals Offered By Tutor Joshua.

3.5

73 beoordelingen

5
26
4
16
3
14
2
1
1
16

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen