Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

ITS Cybersecurity Practice Exam – Latest 2025/2026 Exam Prep & Study Guide

Beoordeling
-
Verkocht
-
Pagina's
21
Cijfer
A+
Geüpload op
16-12-2025
Geschreven in
2025/2026

Prepare effectively for the ITS Cybersecurity Exam with this fully updated 2025/2026 Practice Exam & Study Guide. Designed for IT and cybersecurity students, professionals, and certification candidates, this resource provides exam-style practice questions, verified answers, and detailed explanations covering essential cybersecurity concepts and best practices. This guide reinforces network security, risk management, cryptography, threat mitigation, and incident response, making it ideal for practice testing, self-study, and final exam preparation. What’s Included ️ Latest 2025/2026 ITS Cybersecurity practice exam questions ️ Verified correct answers with detailed rationales ️ Threats, vulnerabilities, and mitigation strategies ️ Network and system security fundamentals ️ Cryptography, authentication, and access control ️ Risk management, compliance, and governance ️ Incident response & security operations ️ Ideal for practice testing, exam readiness, and concept review Perfect For ITS cybersecurity exam candidates IT and cybersecurity students and professionals Certification exam preparation and self-study Anyone seeking updated, exam-aligned cybersecurity practice questions This study guide helps you strengthen understanding of key concepts, identify weak areas, and approach the ITS Cybersecurity Exam with confidence

Meer zien Lees minder
Instelling
ITS Cybersecurity
Vak
ITS Cybersecurity

Voorbeeld van de inhoud

ITS Cybersecurity Practice Exam – Latest
2025/2026 Exam Prep & Study Guide

A self-propagating malicious code that can propagate to other systems on the network
and consume resources that could lead to a denial-of-service attack is called a _____. -
correct answerworm

A computer malware code that replicates itself on the target computer and spreads
through the network causing damage and distributing additional harmful payloads is
called a _____. - correct answervirus

A program that appears to be useful or harmless but contains hidden code that can
compromise the target system on which it runs is called a _____. - correct answerTrojan
horse

What are the two classes of encryption algorithms? (Choose 2.) - correct
answerAsymmetric
Symmetric

Which algorithm is a one-way mathematical function that is used to provide data
integrity? - correct answerSHA-2

Why is it important to block incoming IP broadcast addresses and reserved private IP
addresses from entering your network? - correct answerThese types of addresses are
easier to use for IP spoofing attacks.

You are a junior cybersecurity analyst. An employee reports to you that her laptop was
stolen. For which three reasons should you escalate this event to the Computer Security
Incident Response Team (CSIRT)? (Choose 3.) - correct answerPotential network
disruption or denial of service
Exposure of sensitive or confidential information
Unauthorized use of resources

Which classification of alert should be escalated to security investigators? - correct
answerTrue positive

Which term refers to the combined sum of all potential threat vectors in defense-in-
depth security? - correct answerAttack surface

,You receive an email from your teacher that has a link to a class poll for a pizza party.
You click the link which takes you to the school portal to log in. Later, you discover this
was a phishing email and your credentials were stolen. Which part of the CIA Triad was
compromised in this attack? - correct answerConfidentiality

A major power surge occurs in the middle of making authorized changes to the
company payroll server which results in equipment failure. The equipment is replaced
and the data is restored from a previous, good backup. Which part of the CIA Triad was
preserved? - correct answerAvailability

Which two states of data domains would require encryption and hashing to secure the
data? (Choose 2.) - correct answerData at rest
Data in transit

In which order should you collect digital evidence from a computer system? - correct
answerContents of RAM, Contents of Fixed Disk, Archived Backup

Which type of attack substitutes a source IP address to impersonate a legitimate
computer system? - correct answerIP Spoofing

In a DHCP __ attack, threat actors configure a fake DHCP server on the network to
issue DHCP addresses to clients. - correct answerspoofing

In a DHCP __ attack, threat actors flood the DHCP server with DHCP requests to use
up all the available IP addresses that the legitimate DHCP server can issue. - correct
answerstarvation

In a DNS __ attack, threat actors use publicly accessible open DNS servers to flood a
target with DNS response traffic. - correct answeramplification

In a DNS __ attack, threat actors change the A record for your domain's IP address to
point to a predetermined address of their choice. - correct answerhijacking

An attacker on the local network is forwarding packets that associate the MAC address
of the attacker's computer with the IP address of a legitimate server. Which type of
attack is taking place? - correct answerARP Spoofing

An attacker has connected a laptop to a wireless network and attempts to lease all
available IP addresses from the DHCP server. Which type of attack is occurring? -
correct answerDHCP Starvation

An attacker has overwhelmed a server by sending more GET requests than the server
can process. This results in a successful DoS attack. Which type of attack has
occurred? - correct answerHTTP flooding

, _____ is used to find vulnerabilities within a computer system. - correct
answerPenetration testing

Establish the incident response team.
Determine if an incident has occurred.
Validate the IP address of the attacking host.
Hold a lessons learned meeting. - correct answerPreparation Phase
Detection & Analysis Phase
Containment, Eradication, and Recovery Phase
Post-Incident Activity Phase

In which phase of the NIST Incident Response Life Cycle do you investigate network
intrusion detection sensor alerts? - correct answerDetection & Analysis Phase

Which compliance act must a hospital located in the U.S. adhere to when investigating
security incidents involving patients' personal medical information? - correct
answerHIPAA

For the following statement, select True or False. Threat intelligence services use the
data of their subscribers to stay current with the threat landscape - correct answerTrue

Your friend wants to use your home Wi-Fi network to access the Internet from their
smartphone. What are two potential security checks to verify before allowing your
friend's device on your network? (Choose 2.) - correct answerTheir device was scanned
with the latest antivirus/anti-malware definition update.
Your important or sensitive files, devices, and peripherals are on a private network.

Minimizes attacks from automatic execution of malicious code and viruses from rogue
websites

Reduces risk of exposed or misused sensitive data if the device is stolen

Allows the company to access, restore, and secure important features and applications
in the event of theft - correct answerUnnecessary browser functions are disabled
File encryption is enabled and functioning
Devices are remotely managed by the CSIRT team

Which technology should a company use to enforce corporate policies on BYOD
devices connecting to the network? - correct answerNAC

Enforcing policies for users and devices joining the network.
Blocking malicious traffic from entering the private network.
Securing traffic flows over an unsecured network. - correct answerNAC
Firewall
VPN

Geschreven voor

Instelling
ITS Cybersecurity
Vak
ITS Cybersecurity

Documentinformatie

Geüpload op
16 december 2025
Aantal pagina's
21
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$16.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Successscore Phoenix University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
57
Lid sinds
8 maanden
Aantal volgers
1
Documenten
1962
Laatst verkocht
2 dagen geleden
Ultimate Study Resource | Nursing, HESI, ATI, TEAS, Business & More

Welcome to your one-stop exam prep store!

3.1

11 beoordelingen

5
3
4
2
3
2
2
1
1
3

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen