Cybersecurity Fundamentals Exam Bank - 1182 Verified Questions

Page 1


Cybersecurity Fundamentals Exam

Bank

Course Introduction

Cybersecurity Fundamentals provides an introduction to the core principles, techniques, and technologies used to protect computer systems, networks, and data from cyber threats. The course covers essential topics such as types of cyberattacks, cryptography, network security, secure software development, risk management, and legal and ethical considerations. Students will gain practical insights into identifying vulnerabilities, implementing security measures, and responding to incidents. By the end of the course, learners will understand the foundational concepts necessary to pursue further study or careers in cybersecurity.

Recommended Textbook

Business Data Networks and Security 9th Edition by Raymond

Available Study Resources on Quizplus

15 Chapters

1182 Verified Questions

1182 Flashcards

Source URL: https://quizplus.com/study-set/1451

Page 2

Chapter 1: Welcome to the Cloud

Available Study Resources on Quizplus for this Chatper

92 Verified Questions

92 Flashcards

Source URL: https://quizplus.com/quiz/28793

Sample Questions

Q1) The Ethernet address of an access point is its ________.

A)SSID

B)BSSID

C)both A and B

D)neither A nor B

Answer: B

Q2) Hosts on the Internet have two addresses.

A)True

B)False

Answer: True

Q3) Your ISP gives your home a single IP address.What in the access router allows you to have multiple devices share a single IP address?

A)DNS

B)NAT

C)multiplexing

D)none of the above

Answer: B

To view all questions and flashcards with answers, click on the resource link above.

Page 3

Chapter 2: Network Standards

Available Study Resources on Quizplus for this Chatper

100 Verified Questions

100 Flashcards

Source URL: https://quizplus.com/quiz/28800

Sample Questions

Q1) Which of the following is NOT an OSI layer name?

A)data link

B)internet

C)session

D)presentation

Answer: C

Q2) How long are IPv4 addresses?

A)4 octets

B)6 octets

C)20 octets

D)32 octets

Answer: A

Q3) If the destination host does not receive a segment,it will ________.

A)transmit an ACK segment

B)transmit a NAC segment

C)transmit an RSND segment

D)none of the above

Answer: D

To view all questions and flashcards with answers, click on the resource link above. Page 4

Chapter 3: Network Security

Available Study Resources on Quizplus for this Chatper

152 Verified Questions

152 Flashcards

Source URL: https://quizplus.com/quiz/28801

Sample Questions

Q1) The last stage in a hacking attack is ________.

A)scanning

B)the break-in

C)creating a back door

D)none of the above

Answer: D

Q2) An attack in which an authentic-looking e-mail or website entices a user to enter his or her username,password,or other sensitive information is called ________.(Select the most specific answer.)

A)phishing

B)identity theft

C)social engineering

D)a spyware attack

Answer: A

Q3) A firewall will drop a packet if it ________.

A)is a definite attack packet

B)is a probable attack packet

C)both A and B

D)neither A nor B

Answer: A

To view all questions and flashcards with answers, click on the resource link above. Page 5

Chapter 4: Network Management

Available Study Resources on Quizplus for this Chatper

96 Verified Questions

96 Flashcards

Source URL: https://quizplus.com/quiz/28802

Sample Questions

Q1) If a carrier does not meet its SLA guarantees,it generally must pay a penalty to its customers.

A)True

B)False

Q2) An access point has a total throughput of 100 Mbps.Twenty-five users are working at laptops that use the access point.The speed a particular user will get at any particular moment is likely to be ________.

A)100 Mbps

B)4 Mbps

C)neither of the above

Q3) When a packet travels through a network,the time it takes to get from the sender to the receiver is called ________.

A)latency

B)milliseconds

C)jitter

D)throughput

Q4) Variability in delay is called jitter.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 6

Chapter 5: Wired Ethernet Lans

Available Study Resources on Quizplus for this Chatper

117 Verified Questions

117 Flashcards

Source URL: https://quizplus.com/quiz/28803

Sample Questions

Q1) Ethernet MAC layer addresses are also called physical addresses.

A)True

B)False

Q2) The minimum length of an Ethernet data field is ________.

A)46 octets

B)64 octets

C)1,500 octets

D)There is no minimum length for the Ethernet data field.

Q3) Untwisting wire pairs no more than 1.25 cm (a half inch)at their ends reduces

A)interference

B)crosstalk interference

C)terminal crosstalk interference

D)none of the above

Q4) Ethernet processing is executed in hardware.

A)True

B)False

Q5) A company must have strong security to use the SNMP ________ command.

A)Get

B)Set

To view all questions and flashcards with answers, click on the resource link above. Page 7

Chapter 6: Wireless Lans I

Available Study Resources on Quizplus for this Chatper

97 Verified Questions

97 Flashcards

Source URL: https://quizplus.com/quiz/28804

Sample Questions

Q1) Which of the following uses OFDM?

A)802.11g

B)802.11n

C)both A and B

D)neither A nor B

Q2) The other wireless device is far away in a known direction.You should use

A)an omnidirectional antenna

B)a dish antenna

C)neither A nor B

Q3) In an extended service set,each access point ________.

A)must have the same SSID

B)must have different SSIDs

C)must have coordinated SSIDs

D)none of the above

Q4) Access points take frames from wireless devices and send these frames on to devices on the wired LAN.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 8

Chapter 7: Wireless Lans 2

Available Study Resources on Quizplus for this Chatper

75 Verified Questions

75 Flashcards

Source URL: https://quizplus.com/quiz/28805

Sample Questions

Q1) Hackers cannot eavesdrop on near-field communication transmissions unless they are almost right next to the device.

A)True

B)False

Q2) Classic Bluetooth uses ________.

A)OFDM

B)Frequency Hopping Spread Spectrum

C)both A and B

D)neither A nor B

Q3) In 802.11i PSK mode,the pass phrase should be at least ________ characters long.

A)6

B)8

C)20

D)128

Q4) In what mode of 802.11i operation is a central authentication server used?

A)802.1X mode

B)PSK mode

C)both A and B

D)neither A nor B

To view all questions and flashcards with answers, click on the resource link above. Page 9

Chapter 8: Tcpip Internetworking I

Available Study Resources on Quizplus for this Chatper

96 Verified Questions

96 Flashcards

Source URL: https://quizplus.com/quiz/28806

Sample Questions

Q1) In a network mask,the 1s correspond to the ________.

A)network part

B)subnet part

C)host part

D)none of the above

Q2) The default row ________.

A)always has the mask /32

B)will always match the IP address of an incoming packet

C)both A and B

D)neither A nor B

Q3) The new version of Internet Protocol that is coming into use is IP version ________.

A)1

B)4

C)5

D)6

Q4) When a packet arrives,the router should look for matches in ALL rows in the routing table.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 10

Chapter 9: Tcpip Internetworking 2

Available Study Resources on Quizplus for this Chatper

104 Verified Questions

104 Flashcards

Source URL: https://quizplus.com/quiz/28807

Sample Questions

Q1) In IP subnet planning,you need to have at least 130 subnets.How large should your subnet part be?

A)6

B)7

C)8

D)none of the above

Q2) Which of the following is true about NAT?

A)it can enhance security

B)it presents problems for some protocols

C)both A and B

D)neither A nor B

Q3) In DNS,a group of resources under the control of an organization is called a

A)network

B)subnet

C)scope

D)domain

Q4) In tunnel mode,IPsec provides protection all the way between the two hosts.

A)True

B)False

To view all questions and flashcards with answers, click on the resource link above. Page 11

Chapter 10: Wide Area Networks

Available Study Resources on Quizplus for this Chatper

84 Verified Questions

84 Flashcards

Source URL: https://quizplus.com/quiz/28794

Sample Questions

Q1) Which of the following DSL services tend to be symmetric in speed?

A)residential

B)business

C)both A and B

D)neither A nor B

Q2) ATM ________.

A)offers speeds in the range of greatest corporate demand

B)is relatively inexpensive

C)both A and B

D)neither A nor B

Q3) If I use Channel3 in a cell,I can reuse that same channel in an adjacent cell with traditional cellular technology.

A)True

B)False

Q4) Why is metro Ethernet popular?

A)familiarity

B)rapid reprovisioning

C)both A and B

D)neither A nor B

To view all questions and flashcards with answers, click on the resource link above. Page 12

Chapter 11: Networked Applications

Available Study Resources on Quizplus for this Chatper

95 Verified Questions

95 Flashcards

Source URL: https://quizplus.com/quiz/28795

Sample Questions

Q1) In SOAs,a program written in C++ can communicate with a program written in Java.

A)True

B)False

Q2) The code "200" may be found in HTTP ________ messages.

A)request

B)response

C)both A and B

D)neither A nor B

Q3) Which of the following is used to retrieve Web pages?

A)HTTP

B)HTML

C)RTP

D)SQL

Q4) A traditional e-mail user sending messages to his or her mail server would most likely use ________.

A)the IMAP standard

B)the POP standard

C)either the IMAP or POP standard

D)the SMTP standard

To view all questions and flashcards with answers, click on the resource link above. Page 13

Chapter 12: Module a More on Tcp

Available Study Resources on Quizplus for this Chatper

4 Verified Questions

4 Flashcards

Source URL: https://quizplus.com/quiz/28796

Sample Questions

Q1) A TCP segment begins with octet 8,658 and ends with octet 12,783.What number does the sending host put in the sequence number field?

A)8,658

B)8,659

C)12,783

D)12,784

Q2) A TCP segment carries data octets 456 through 980.The following TCP segment is a supervisory segment carrying no data.What value is in the sequence number field of the latter TCP segment?

A)456

B)457

C)980

D)981

Q3) Flow control in TCP depends on the ________ field.

A)acknowledgement number

B)window size

C)both A and B

D)neither A nor B

To view all questions and flashcards with answers, click on the resource link above.

14

Chapter 13: Module B More on Modulation

Available Study Resources on Quizplus for this Chatper

12 Verified Questions

12 Flashcards

Source URL: https://quizplus.com/quiz/28797

Sample Questions

Q1) QPSK modulation uses ________ phases.

A)2

B)4

C)8

D)15

Q2) Amplitude modulation uses two ________ levels.

A)loudness

B)frequency

C)both A and B

Q3) In QAM,if you have four possible amplitudes,you have ________ possible states.

A)4

B)8

C)16

D)none of the above

Q4) Phase modulation uses two ________ levels.

A)loudness

B)frequency

C)both A and B

D)neither A nor B

To view all questions and flashcards with answers, click on the resource link above. Page 15

Chapter 14: Module C More on Telecommunications

Available Study Resources on Quizplus for this Chatper

47 Verified Questions

47 Flashcards

Source URL: https://quizplus.com/quiz/28798

Sample Questions

Q1) For PBXs,camp-on is ________.

A)a user service

B)an attendant service

C)a management service

Q2) In the United States,which of the following is a carrier?

A)ILEC

B)LATA

C)both A and B

D)neither A nor B

Q3) Deregulation is lowest for ________.

A)customer premises equipment

B)local telephone service

C)long-distance telephone service

D)All of the above are deregulated to about the same degree.

Q4) Which of the following is an advanced carrier telephone service?

A)voice mail

B)caller ID

C)both A and B

D)neither A nor B

To view all questions and flashcards with answers, click on the resource link above. Page 16

Chapter 15: Module D Directory Servers

Available Study Resources on Quizplus for this Chatper

11 Verified Questions

11 Flashcards

Source URL: https://quizplus.com/quiz/28799

Sample Questions

Q1) Which of the following is used to query a directory server to get someone's e-mail address?

A)LDAP

B)IMAP

C)SNMP

D)HTTP

Q2) If a company has multiple authentication servers,which devices are likely to hold the authentication data?

A)authenticators

B)authentication servers individually

C)authentication servers doing replication

D)directory servers

Q3) Directory servers organize information in a ________.

A)mesh

B)hierarchy

C)relational database

D)Any of the above can be used.

Q4) A company may have many AD domains.

A)True

B)False

Page 17

To view all questions and flashcards with answers, click on the resource link above.

Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.