Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CYBER 262 EXAM 1 QUESTIONS WELL ANSWERED LATEST UPDATE 2026

Beoordeling
-
Verkocht
-
Pagina's
4
Cijfer
A+
Geüpload op
16-05-2026
Geschreven in
2025/2026

CYBER 262 EXAM 1 QUESTIONS WELL ANSWERED LATEST UPDATE 2026 Zero Day - Answers A newly released bug without a known fix is a _______________? (Basically the Vendor has just found out about it) Sign In and (Preferably with an NDA) - Answers In terms of Premises Security, visitors should at the least be required to ____________________. (Choose the Best Answer) Data - Answers What is at the heart of the CIA triad ? True - Answers Your company has failed to apply critical security patches to your servers for months, this is increasing your overall vulnerabilities. Intangible Assets - Answers With our connected world the most pressing concern of corporations in regard to Information Security is protecting their: Risk Management - Answers The Ultimate exercise in planning for security is essentially about? False - Answers The most important asset that a company must protect is it's data, followed closely by the safety of it's people. True - Answers Your company has failed to apply critical security patches to your servers for months, this is increasing your overall risk. Risk - Answers ISO 27001 Helps Organizations Manage this: Threat - Answers A rogue employee who was just fired, he/she is a: Vulnerability - Answers A Broken Door Lock with Key Card Reader that forces the organization to keep the door propped open is a: Recover - Answers Restoring Data from backups is to: Detect - Answers Monitoring Intrusion Detection Systems is to: Prevent - Answers Applying Security Patches is to: ARP - Answers Which service handles the mapping of an ip address to the physical address (MAC) of a device? - User Datagram Protocol (UDP) - Transmission Control Protocol (TCP) - Answers Which two protocols function at the Transport Layer of the OSI Model CHOOSE TWO True - Answers The low order bits in an IP Address start would be represented by 8 - 4 - 2 - 1 Hop - Answers If you perform a traceroute from your computer to a website, the _________ count that displays reflects the number of routers that your trace is passing through to get to the destination. (8 ones) - Answers Fill in the Blank with the exact answer required. What is the Binary representation of decimal 255 ? False - Answers The high order bits in an IP Address start at the first position (Highest) and would be represented by 1 -2 - 4 -8 - MAC - OUI - Answers A unique 48 or 64 bit identifier that is given to network interface equipment to provide a unique connection is known as a _____________. The first 24 bits identify the Manufacturer of the device and are referred to as the __________ 255.255.255.0 - Answers A Class C Network would require a subnet mask of ? Seven - Answers The OSI Model Consists of _______ Layers? Switch - Answers A vendor is introducing a new Layer 2 device, what is the best possible answer as to what that device's function is? Protocol Data Unit (PDU) - Answers A networking unit that contains network addressing data, in the Application layer of the OSI model and is referred to as (Data Stream). Core - Answers This hierarchical networking model layer is responsible for the high speed routing and switching functions, typically within the Data Center of an enterprise class network. Hash - Answers A ___________________ is a mathematical function that creates a fixed length unique output with any size or set of data. It is a one way function meaning that it cannot be reversed. Vulnerability - Answers A __________________ is a bug present in a system that has not been patched that creates a risk. Layer 4 - Answers It's PDU's consist of Segments Layer 1 - Answers Deals in Bits Layer 7 - Answers http runs at this layer OSI - Answers Theoretical Network Model with 7 layers TCP/IP (Transmission Control Protocol/Internet Protocol) - Answers Practical Network Model with 4 layers Virtualization - Answers Allows multiple logical components to run on top of physical hardware DMZ - Answers A physical and logical sub network that acts as an intermediary for connected security devices so that they avoid exposure to a larger and untrusted network, usually the Internet is known as a _______________ VLAN - Answers What is used to divide a physical networks that isolates traffic into smaller logical networks of a single broadcast domain for the purpose of segmenting network functions and capabilities. Operating Procedures - Answers What should organizations design to state how personnel should conduct a particular process or configure a particular system to provide a standard, repeatable means to accomplish a task in a safe manner in order to ensure security Auditing - Answers What administrative process determines if a firewall is providing the desired security. Most Specific Network Traffic - Answers In a first match policy, to prevent shadowing anomalies, rules that apply to the ___________________ are placed at the top of the list. ICMP - Answers What potentially unwanted protocol is used by network devices to send messages that can include destination unreachable, time exceeded, or echo request. True - Answers When a packet arrives at a firewall, a security policy will determine appropriate action of accept or drop. Zero-Trust - Answers What security model improves on traditional perimeter based trust Firewall ownership expense - Answers Which of the following is not an issue with traditional trust models Decrease Cost - Answers Which of the following is not a true statement about Network Segmentation Employees - Answers What is a non-technical component that is typically the weakest link in information security. False - Answers Your company has failed to apply critical security patches to your servers for months, this is creating a lot of threats. Confidentiality - Answers Data Breach leaked the Social Security Numbers of 10 Million customers. availability - Answers Users experienced timeouts and slow response time when checking out of the online shopping cart integrity - Answers A SQL Injection attack dropped several tables from the database DNS - Answers Enables IP Addresses like 146.186.16.57 to be linked to PSU.EDU so that users only have to enter PSU.EDU or the website domain name to access a site? Broadcast traffic - Answers What is a major issue with HUBS ? False - Answers Sniffing the Physical Layer of the OSI Reference Model will reveal details about packet headers and destination and give the attacker enough details to gain entry into a system? True - Answers The low order bits in an IP Address start would be represented by 8 - 4 - 2 - 1 True - Answers Network Firewalls cannot completely protect hosts from zero-day exploits? Dynamic Routers - Answers Network routes that adjust to changes in the network and are typically used in larger enterprise networks. VLAN - Answers The network technology that allows a virtual network to be created over a physical network is called? 25 - Answers You need to setup a temporary firewall rule to block smtp mail traffic while you update an email server. What port should you block? False - Answers TCP is a connection less protocol that is popular with Streaming apps due to its speed? Host-based firewall - Answers Which of the following is not a recommend requirement for host based security IDS - Answers What device is based on the passive monitoring of network traffic? Default-deny - Answers In a first match policy, a ________________ rule is placed at the end of the policy and applies to all packets. Virtual LAN - Answers Which of the following is not one of the discussed network configurations for firewall placement. Host-based - Answers Which of the following is not one of the 3 general classes of firewalls Defense in Depth - Answers What concept originated in military strategy to provide barriers to impede intruders Nothing - Answers When trying to connect using SSH, with the default DENY setting configured on UFW and no rule allowing the port to connect? IPv6 - Answers Address length of 128 bits CIDR - Answers Replaced Classful IP addressing schemes 32 - Answers An IPv4 network address is how many bits? False - Answers A CRC check and other connection related error checking would occur with the UDP protocol running on the Transport Layer of the TCP/IP stack

Meer zien Lees minder
Instelling
CYBER 262
Vak
CYBER 262

Voorbeeld van de inhoud

CYBER 262 EXAM 1 QUESTIONS WELL ANSWERED LATEST UPDATE 2026

Zero Day - Answers A newly released bug without a known fix is a _______________?
(Basically the Vendor has just found out about it)
Sign In and (Preferably with an NDA) - Answers In terms of Premises Security, visitors should at the
least be required to ____________________. (Choose the Best Answer)
Data - Answers What is at the heart of the CIA triad ?
True - Answers Your company has failed to apply critical security patches to your servers for months,
this is increasing your overall vulnerabilities.
Intangible Assets - Answers With our connected world the most pressing concern of corporations in
regard to Information Security is protecting their:
Risk Management - Answers The Ultimate exercise in planning for security is essentially about?
False - Answers The most important asset that a company must protect is it's data, followed closely
by the safety of it's people.
True - Answers Your company has failed to apply critical security patches to your servers for months,
this is increasing your overall risk.
Risk - Answers ISO 27001 Helps Organizations Manage this:
Threat - Answers A rogue employee who was just fired, he/she is a:
Vulnerability - Answers A Broken Door Lock with Key Card Reader that forces the organization to
keep the door propped open is a:
Recover - Answers Restoring Data from backups is to:
Detect - Answers Monitoring Intrusion Detection Systems is to:
Prevent - Answers Applying Security Patches is to:
ARP - Answers Which service handles the mapping of an ip address to the physical address (MAC) of a
device?
- User Datagram Protocol (UDP)
- Transmission Control Protocol (TCP) - Answers Which two protocols function at the Transport Layer
of the OSI Model CHOOSE TWO
True - Answers The low order bits in an IP Address start would be represented by
8-4-2-1
Hop - Answers If you perform a traceroute from your computer to a website, the _________ count
that displays reflects the number of routers that your trace is passing through to get to the
destination.
11111111 (8 ones) - Answers Fill in the Blank with the exact answer required.
What is the Binary representation of decimal 255 ?
False - Answers The high order bits in an IP Address start at the first position (Highest) and would be
represented by
1 -2 - 4 -8
- MAC
- OUI - Answers A unique 48 or 64 bit identifier that is given to network interface equipment to
provide a unique connection is known as a _____________.
The first 24 bits identify the Manufacturer of the device and are referred to as the __________
255.255.255.0 - Answers A Class C Network would require a subnet mask of ?
Seven - Answers The OSI Model Consists of _______ Layers?
Switch - Answers A vendor is introducing a new Layer 2 device, what is the best possible answer as to
what that device's function is?
Protocol Data Unit (PDU) - Answers A networking unit that contains network addressing data, in the
Application layer of the OSI model and is referred to as (Data Stream).
Core - Answers This hierarchical networking model layer is responsible for the high speed routing and
switching functions, typically within the Data Center of an enterprise class network.
Hash - Answers A ___________________ is a mathematical function that creates a fixed length
unique output with any size or set of data. It is a one way function meaning that it cannot be
reversed.
Vulnerability - Answers A __________________ is a bug present in a system that has not been
patched that creates a risk.
Layer 4 - Answers It's PDU's consist of Segments
Layer 1 - Answers Deals in Bits

Geschreven voor

Instelling
CYBER 262
Vak
CYBER 262

Documentinformatie

Geüpload op
16 mei 2026
Aantal pagina's
4
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$11.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
joshuawesonga22 Liberty University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
97
Lid sinds
1 jaar
Aantal volgers
1
Documenten
14119
Laatst verkocht
21 uur geleden
Tutor Wes

Hi there! I'm Tutor Wes, a dedicated tutor with a passion for sharing knowledge and helping others succeed academically. All my notes are carefully organized, detailed, and easy to understand. Whether you're preparing for exams, catching up on lectures, or looking for clear summaries, you'll find useful study materials here. Let’s succeed together!

3.9

9 beoordelingen

5
4
4
1
3
3
2
1
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen