ITS Cybersecurity Practice Exam Questions and Correct Answers
ITS Cybersecurity Practice Exam Questions and Correct Answers A self-propagating malicious code that can propagate to other systems on the network and consume resources that could lead to a denial-of-service attack is called a _____. - Correct Answer worm A computer malware code that replicates itself on the target computer and spreads through the network causing damage and distributing additional harmful payloads is called a _____. - Correct Answer virus A program that appears to be useful or harmless but contains hidden code that can compromise the target system on which it runs is called a _____. - Correct Answer Trojan horse What are the two classes of encryption algorithms? (Choose 2.) - Correct Answer Asymmetric Symmetric Which algorithm is a one-way mathematical function that is used to provide data integrity? - Correct Answer SHA-2 Why is it important to block incoming IP broadcast addresses and reserved private IP addresses from entering your network? - Correct Answer These types of addresses are easier to use for IP spoofing attacks. You are a junior cybersecurity analyst. An employee reports to you that her laptop was stolen. For which three reasons should you escalate this event to the Computer Security Incident Response Team (CSIRT)? (Choose 3.) - Correct Answer Potential network disruption or denial of service Exposure of sensitive or confidential information Unauthorized use of resources Whic
Geschreven voor
- Instelling
- ITS Cybersecurity
- Vak
- ITS Cybersecurity
Documentinformatie
- Geüpload op
- 19 februari 2026
- Aantal pagina's
- 22
- Geschreven in
- 2025/2026
- Type
- Tentamen (uitwerkingen)
- Bevat
- Vragen en antwoorden
Onderwerpen
-
a self propagating malicious code that can propaga
-
a computer malware code that replicates itself on
-
a program that appears to be useful or harmless bu