EXAM WITH CORRECT ACTUAL
QUESTIONS AND CORRECTLY WELL
DEFINED ANSWERS LATEST ALREADY
GRADED A+
1. What does CIA in cybersecurity stand for?
A. Control, Integrity, Authentication
B. Confidentiality, Integrity, Availability
✔ C. Confidentiality, Integrity, Availability
D. Cybersecurity, Intelligence, Access
Explanation:
CIA triad is the foundation of cybersecurity, focusing on
protecting data confidentiality, ensuring data integrity, and
maintaining system availability.
,2. Which protocol is used for secure web browsing?
A. HTTP
✔ B. HTTPS
C. FTP
D. SMTP
Explanation:
HTTPS encrypts data using SSL/TLS, ensuring secure
communication between browser and server.
3. What is malware?
A. Hardware failure
✔ B. Malicious software designed to harm systems
C. Network configuration tool
D. Encryption method
Explanation:
,Malware includes viruses, worms, ransomware, and
spyware designed to disrupt or damage systems.
4. What is phishing?
A. Network scanning
✔ B. Fraudulent attempt to steal sensitive information
C. Software update
D. Encryption technique
Explanation:
Phishing uses deceptive emails or messages to trick users
into revealing credentials.
5. Which device filters network traffic based on rules?
A. Switch
✔ B. Firewall
C. Router
D. Hub
, Explanation:
A firewall monitors and controls incoming and outgoing
network traffic based on security rules.
6. What is an IP address?
A. Software license
✔ B. Unique identifier for a device on a network
C. Antivirus tool
D. Encryption key
Explanation:
An IP address identifies and locates devices on a network.
7. Which is a strong password practice?
A. Using birthdate
✔ B. Using long random combinations
C. Reusing passwords
D. Writing passwords on paper