Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Cybersecurity Final Exam (updated)2022

Rating
-
Sold
-
Pages
6
Grade
A+
Uploaded on
07-06-2022
Written in
2020/2021

Cybersecurity Final Exam (updated)2022 malware is a generic term for software that has a malicious purpose true what device can connect many computers and sends data only out of one port? switch 00:16 01:20 one defense against denial-of-survival is to ______ ICMP packets block what is spyware? Any software that monitors your system a(n) hides the internal networks IP address and presents a single IP address to the outside world proxy server which TCP/IP protocol operates on port 25 and sends email SMTP Which TCIP/IP protocol operates on port 80 and displays web pages? HTTP Someone who breaks into a system illegally to assess security deficiencies is a sneaker. False confidentiality, integrity, and availability are three pillars of the CIA triangle true unshielded twisted-pair cable with a specification of 100 MHz/100 Mbps is also called category ______ 5 what is a penetration tester a person who hacks a system to test its vulnerabilities the IP command line command to determine the number of hops it takes to get from your computer to its destination is ping. false

Show more Read less
Institution
Course

Content preview

Cybersecurity Final
malware is a generic term for software that has a malicious purpose - Answer true

what device can connect many computers and sends data only out of one port? -
Answer switch

one defense against denial-of-survival is to ______ ICMP packets - Answer block

what is spyware? - Answer Any software that monitors your system

a(n) hides the internal networks IP address and presents a single IP address to the
outside world - Answer proxy server

which TCP/IP protocol operates on port 25 and sends email - Answer SMTP

Which TCIP/IP protocol operates on port 80 and displays web pages? - Answer HTTP

Someone who breaks into a system illegally to assess security deficiencies is a
sneaker. - Answer False

confidentiality, integrity, and availability are three pillars of the CIA triangle - Answer true

unshielded twisted-pair cable with a specification of 100 MHz/100 Mbps is also called
category ______ - Answer 5

what is a penetration tester - Answer a person who hacks a system to test its
vulnerabilities

the IP command line command to determine the number of hops it takes to get from
your computer to its destination is ping. - Answer false

your company is instituting a new security awareness program. you are responsible for
educating end users variety of threats, including social engineering. which of the
following best defines social engineering? - Answer using people skills to obtain
proprietary information

the technique for breaching a systems security by exploiting human nature rather than
technology is war-driving. - Answer true

mcAfee and Norton are examples of_______ - Answer anti-virus scanners

a virus is any file that can self replicate - Answer true

MAC addresses are unique dresses for each NIC. - Answer True

a program that looks benign but actually has a malicious purpose is a ______ - Answer
Trojan horse

, Cybersecurity Final
when a hacking technique uses persuasion and deception to get a person to provide
information to help compromise security, this is referred to as what? - Answer social
engineering

if your computer has an ip address 169.254.130.1 what has happened? - Answer DHCP
failover has automatically assigned an address

the most desirable approach to security is one that is which of the following? - Answer
layered and dynamic

a firewall can be configured to disallow certain types of incoming traffic that may be
attacking - Answer true

someone who calls himself a hacker but lacks the expertise is a ______ - Answer script
kiddy

someone who gains access to a system and causes harm is a _____? - Answer black
hat hacker

a denial of service attack is one of the most common attacks on a system. - Answer true

an IP address consists of four numbers, separated by dots. Each number is called
a(n)_____. - Answer octet

what is the binary equivalent of the decimal number 240? - Answer 11110000

one extreme viewpoint about computer security is - Answer the are no imminent
dangers to your system

the simplest device for connecting computers is a - Answer hub

a protocol that translates web addresses into IP address is called - Answer DNS

which utility gives you information about your machines network configuration? - Answer
IPconfig

the most common internet investment fraud is the - Answer Nigerian fraud

what is the top fuel for avoiding internet fraud? - Answer if it seems too good to be true,
it probably is.

what is cyberstalking? - Answer any use of electronic communications to stalk a person

what can you do on your personal computer to protect your privacy? - Answer set your
browser security setting

Written for

Course

Document information

Uploaded on
June 7, 2022
Number of pages
6
Written in
2020/2021
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$9.49
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
EvaTee Phoenix University
Follow You need to be logged in order to follow users or courses
Sold
5205
Member since
4 year
Number of followers
3567
Documents
55650
Last sold
6 hours ago
TIGHT DEADLINE? I CAN HELP

Many students don\'t have the time to work on their academic papers due to balancing with other responsibilities, for example, part-time work. I can relate. kindly don\'t hesitate to contact me, my study guides, notes and exams or test banks, are 100% graded

3.8

947 reviews

5
451
4
167
3
171
2
48
1
110

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions