

Cybersecurity Fundamentals Exam
Bank
Course Introduction
Cybersecurity Fundamentals provides an introduction to the core principles, techniques, and technologies used to protect computer systems, networks, and data from cyber threats. The course covers essential topics such as types of cyberattacks, cryptography, network security, secure software development, risk management, and legal and ethical considerations. Students will gain practical insights into identifying vulnerabilities, implementing security measures, and responding to incidents. By the end of the course, learners will understand the foundational concepts necessary to pursue further study or careers in cybersecurity.
Recommended Textbook
Business Data Networks and Security 9th Edition by Raymond
Available Study Resources on Quizplus
15 Chapters
1182 Verified Questions
1182 Flashcards
Source URL: https://quizplus.com/study-set/1451

Page 2
R. Panko
Chapter 1: Welcome to the Cloud
Available Study Resources on Quizplus for this Chatper
92 Verified Questions
92 Flashcards
Source URL: https://quizplus.com/quiz/28793
Sample Questions
Q1) The Ethernet address of an access point is its ________.
A)SSID
B)BSSID
C)both A and B
D)neither A nor B
Answer: B
Q2) Hosts on the Internet have two addresses.
A)True
B)False
Answer: True
Q3) Your ISP gives your home a single IP address.What in the access router allows you to have multiple devices share a single IP address?
A)DNS
B)NAT
C)multiplexing
D)none of the above
Answer: B
To view all questions and flashcards with answers, click on the resource link above.

Page 3

Chapter 2: Network Standards
Available Study Resources on Quizplus for this Chatper
100 Verified Questions
100 Flashcards
Source URL: https://quizplus.com/quiz/28800
Sample Questions
Q1) Which of the following is NOT an OSI layer name?
A)data link
B)internet
C)session
D)presentation
Answer: C
Q2) How long are IPv4 addresses?
A)4 octets
B)6 octets
C)20 octets
D)32 octets
Answer: A
Q3) If the destination host does not receive a segment,it will ________.
A)transmit an ACK segment
B)transmit a NAC segment
C)transmit an RSND segment
D)none of the above
Answer: D
To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Network Security
Available Study Resources on Quizplus for this Chatper
152 Verified Questions
152 Flashcards
Source URL: https://quizplus.com/quiz/28801
Sample Questions
Q1) The last stage in a hacking attack is ________.
A)scanning
B)the break-in
C)creating a back door
D)none of the above
Answer: D
Q2) An attack in which an authentic-looking e-mail or website entices a user to enter his or her username,password,or other sensitive information is called ________.(Select the most specific answer.)
A)phishing
B)identity theft
C)social engineering
D)a spyware attack
Answer: A
Q3) A firewall will drop a packet if it ________.
A)is a definite attack packet
B)is a probable attack packet
C)both A and B
D)neither A nor B
Answer: A
To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Network Management
Available Study Resources on Quizplus for this Chatper
96 Verified Questions
96 Flashcards
Source URL: https://quizplus.com/quiz/28802
Sample Questions
Q1) If a carrier does not meet its SLA guarantees,it generally must pay a penalty to its customers.
A)True
B)False
Q2) An access point has a total throughput of 100 Mbps.Twenty-five users are working at laptops that use the access point.The speed a particular user will get at any particular moment is likely to be ________.
A)100 Mbps
B)4 Mbps
C)neither of the above
Q3) When a packet travels through a network,the time it takes to get from the sender to the receiver is called ________.
A)latency
B)milliseconds
C)jitter
D)throughput
Q4) Variability in delay is called jitter.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Wired Ethernet Lans
Available Study Resources on Quizplus for this Chatper
117 Verified Questions
117 Flashcards
Source URL: https://quizplus.com/quiz/28803
Sample Questions
Q1) Ethernet MAC layer addresses are also called physical addresses.
A)True
B)False
Q2) The minimum length of an Ethernet data field is ________.
A)46 octets
B)64 octets
C)1,500 octets
D)There is no minimum length for the Ethernet data field.
Q3) Untwisting wire pairs no more than 1.25 cm (a half inch)at their ends reduces
A)interference
B)crosstalk interference
C)terminal crosstalk interference
D)none of the above
Q4) Ethernet processing is executed in hardware.
A)True
B)False
Q5) A company must have strong security to use the SNMP ________ command.
A)Get
B)Set
To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Wireless Lans I
Available Study Resources on Quizplus for this Chatper
97 Verified Questions
97 Flashcards
Source URL: https://quizplus.com/quiz/28804
Sample Questions
Q1) Which of the following uses OFDM?
A)802.11g
B)802.11n
C)both A and B
D)neither A nor B
Q2) The other wireless device is far away in a known direction.You should use
A)an omnidirectional antenna
B)a dish antenna
C)neither A nor B
Q3) In an extended service set,each access point ________.
A)must have the same SSID
B)must have different SSIDs
C)must have coordinated SSIDs
D)none of the above
Q4) Access points take frames from wireless devices and send these frames on to devices on the wired LAN.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Wireless Lans 2
Available Study Resources on Quizplus for this Chatper
75 Verified Questions
75 Flashcards
Source URL: https://quizplus.com/quiz/28805
Sample Questions
Q1) Hackers cannot eavesdrop on near-field communication transmissions unless they are almost right next to the device.
A)True
B)False
Q2) Classic Bluetooth uses ________.
A)OFDM
B)Frequency Hopping Spread Spectrum
C)both A and B
D)neither A nor B
Q3) In 802.11i PSK mode,the pass phrase should be at least ________ characters long.
A)6
B)8
C)20
D)128
Q4) In what mode of 802.11i operation is a central authentication server used?
A)802.1X mode
B)PSK mode
C)both A and B
D)neither A nor B
To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Tcpip Internetworking I
Available Study Resources on Quizplus for this Chatper
96 Verified Questions
96 Flashcards
Source URL: https://quizplus.com/quiz/28806
Sample Questions
Q1) In a network mask,the 1s correspond to the ________.
A)network part
B)subnet part
C)host part
D)none of the above
Q2) The default row ________.
A)always has the mask /32
B)will always match the IP address of an incoming packet
C)both A and B
D)neither A nor B
Q3) The new version of Internet Protocol that is coming into use is IP version ________.
A)1
B)4
C)5
D)6
Q4) When a packet arrives,the router should look for matches in ALL rows in the routing table.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Tcpip Internetworking 2
Available Study Resources on Quizplus for this Chatper
104 Verified Questions
104 Flashcards
Source URL: https://quizplus.com/quiz/28807
Sample Questions
Q1) In IP subnet planning,you need to have at least 130 subnets.How large should your subnet part be?
A)6
B)7
C)8
D)none of the above
Q2) Which of the following is true about NAT?
A)it can enhance security
B)it presents problems for some protocols
C)both A and B
D)neither A nor B
Q3) In DNS,a group of resources under the control of an organization is called a
A)network
B)subnet
C)scope
D)domain
Q4) In tunnel mode,IPsec provides protection all the way between the two hosts.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Wide Area Networks
Available Study Resources on Quizplus for this Chatper
84 Verified Questions
84 Flashcards
Source URL: https://quizplus.com/quiz/28794
Sample Questions
Q1) Which of the following DSL services tend to be symmetric in speed?
A)residential
B)business
C)both A and B
D)neither A nor B
Q2) ATM ________.
A)offers speeds in the range of greatest corporate demand
B)is relatively inexpensive
C)both A and B
D)neither A nor B
Q3) If I use Channel3 in a cell,I can reuse that same channel in an adjacent cell with traditional cellular technology.
A)True
B)False
Q4) Why is metro Ethernet popular?
A)familiarity
B)rapid reprovisioning
C)both A and B
D)neither A nor B
To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Networked Applications
Available Study Resources on Quizplus for this Chatper
95 Verified Questions
95 Flashcards
Source URL: https://quizplus.com/quiz/28795
Sample Questions
Q1) In SOAs,a program written in C++ can communicate with a program written in Java.
A)True
B)False
Q2) The code "200" may be found in HTTP ________ messages.
A)request
B)response
C)both A and B
D)neither A nor B
Q3) Which of the following is used to retrieve Web pages?
A)HTTP
B)HTML
C)RTP
D)SQL
Q4) A traditional e-mail user sending messages to his or her mail server would most likely use ________.
A)the IMAP standard
B)the POP standard
C)either the IMAP or POP standard
D)the SMTP standard
To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: Module a More on Tcp
Available Study Resources on Quizplus for this Chatper
4 Verified Questions
4 Flashcards
Source URL: https://quizplus.com/quiz/28796
Sample Questions
Q1) A TCP segment begins with octet 8,658 and ends with octet 12,783.What number does the sending host put in the sequence number field?
A)8,658
B)8,659
C)12,783
D)12,784
Q2) A TCP segment carries data octets 456 through 980.The following TCP segment is a supervisory segment carrying no data.What value is in the sequence number field of the latter TCP segment?
A)456
B)457
C)980
D)981
Q3) Flow control in TCP depends on the ________ field.
A)acknowledgement number
B)window size
C)both A and B
D)neither A nor B
To view all questions and flashcards with answers, click on the resource link above.
14

Chapter 13: Module B More on Modulation
Available Study Resources on Quizplus for this Chatper
12 Verified Questions
12 Flashcards
Source URL: https://quizplus.com/quiz/28797
Sample Questions
Q1) QPSK modulation uses ________ phases.
A)2
B)4
C)8
D)15
Q2) Amplitude modulation uses two ________ levels.
A)loudness
B)frequency
C)both A and B
Q3) In QAM,if you have four possible amplitudes,you have ________ possible states.
A)4
B)8
C)16
D)none of the above
Q4) Phase modulation uses two ________ levels.
A)loudness
B)frequency
C)both A and B
D)neither A nor B
To view all questions and flashcards with answers, click on the resource link above. Page 15

Chapter 14: Module C More on Telecommunications
Available Study Resources on Quizplus for this Chatper
47 Verified Questions
47 Flashcards
Source URL: https://quizplus.com/quiz/28798
Sample Questions
Q1) For PBXs,camp-on is ________.
A)a user service
B)an attendant service
C)a management service
Q2) In the United States,which of the following is a carrier?
A)ILEC
B)LATA
C)both A and B
D)neither A nor B
Q3) Deregulation is lowest for ________.
A)customer premises equipment
B)local telephone service
C)long-distance telephone service
D)All of the above are deregulated to about the same degree.
Q4) Which of the following is an advanced carrier telephone service?
A)voice mail
B)caller ID
C)both A and B
D)neither A nor B
To view all questions and flashcards with answers, click on the resource link above. Page 16
Chapter 15: Module D Directory Servers
Available Study Resources on Quizplus for this Chatper
11 Verified Questions
11 Flashcards
Source URL: https://quizplus.com/quiz/28799
Sample Questions
Q1) Which of the following is used to query a directory server to get someone's e-mail address?
A)LDAP
B)IMAP
C)SNMP
D)HTTP
Q2) If a company has multiple authentication servers,which devices are likely to hold the authentication data?
A)authenticators
B)authentication servers individually
C)authentication servers doing replication
D)directory servers
Q3) Directory servers organize information in a ________.
A)mesh
B)hierarchy
C)relational database
D)Any of the above can be used.
Q4) A company may have many AD domains.
A)True
B)False

Page 17
To view all questions and flashcards with answers, click on the resource link above.