QUESTIONS & ANSWERS (2026/2027 LATEST) |
REAL EXAM PREP | VERIFIED SOLUTIONS
A SELF-PROPAGATING MALICIOUS CODE THAT CAN PROPAGATE TO OTHER SYSTEMS ON THE
NETWORK AND CONSUME RESOURCES THAT COULD LEAD TO A DENIAL-OF-SERVICE ATTACK IS
CALLED A _____.
CORRECT ANS: WORM
A COMPUTER MALWARE CODE THAT REPLICATES ITSELF ON THE TARGET COMPUTER AND
SPREADS THROUGH THE NETWORK CAUSING DAMAGE AND DISTRIBUTING ADDITIONAL
HARMFUL PAYLOADS IS CALLED A _____.
CORRECT ANS: VIRUS
A PROGRAM THAT APPEARS TO BE USEFUL OR HARMLESS BUT CONTAINS HIDDEN CODE THAT
CAN COMPROMISE THE TARGET SYSTEM ON WHICH IT RUNS IS CALLED A _____.
CORRECT ANS: TROJAN HORSE
WHAT ARE THE TWO CLASSES OF ENCRYPTION ALGORITHMS? (CHOOSE 2.)
CORRECT ANS: ASYMMETRIC
SYMMETRIC
, WHICH ALGORITHM IS A ONE-WAY MATHEMATICAL FUNCTION THAT IS USED TO PROVIDE DATA
INTEGRITY?
CORRECT ANS: SHA-2
WHY IS IT IMPORTANT TO BLOCK INCOMING IP BROADCAST ADDRESSES AND RESERVED
PRIVATE IP ADDRESSES FROM ENTERING YOUR NETWORK?
CORRECT ANS: THESE TYPES OF ADDRESSES ARE EASIER TO USE FOR IP SPOOFING ATTACKS.
YOU ARE A JUNIOR CYBERSECURITY ANALYST. AN EMPLOYEE REPORTS TO YOU THAT HER
LAPTOP WAS STOLEN. FOR WHICH THREE REASONS SHOULD YOU ESCALATE THIS EVENT TO THE
COMPUTER SECURITY INCIDENT RESPONSE TEAM (CSIRT)? (CHOOSE 3.)
CORRECT ANS: POTENTIAL NETWORK DISRUPTION OR DENIAL OF SERVICE
EXPOSURE OF SENSITIVE OR CONFIDENTIAL INFORMATION
UNAUTHORIZED USE OF RESOURCES
WHICH CLASSIFICATION OF ALERT SHOULD BE ESCALATED TO SECURITY INVESTIGATORS?
CORRECT ANS: TRUE POSITIVE
WHICH TERM REFERS TO THE COMBINED SUM OF ALL POTENTIAL THREAT VECTORS IN
DEFENSE-IN-DEPTH SECURITY?
CORRECT ANS: ATTACK SURFACE