

![]()


Cybersecurity Fundamentals offers an introduction to the core principles, concepts, and technologies that protect information systems from cyber threats. Students will explore topics such as the types of cyber attacks, risk management, security policies, cryptography, network defenses, and ethical considerations in cybersecurity. This course establishes the foundational knowledge required to understand the vulnerabilities and protective measures essential to securing both personal and organizational data in an increasingly connected world.
Recommended Textbook
Corporate Computer Security 4th Edition by
Randy J. Boyle
Available Study Resources on Quizplus
11 Chapters
1198 Verified Questions
1198 Flashcards
Source URL: https://quizplus.com/study-set/1400 Page 2

Available Study Resources on Quizplus for this Chatper
103 Verified Questions
103 Flashcards
Source URL: https://quizplus.com/quiz/27878
Sample Questions
Q1) Which of the following can be a type of spyware?
A) A cookie
B) A keystroke logger
C) Both A and B
D) Neither A nor B
Answer: C
Q2) Employees are very dangerous because they ________.
A) often have access to sensitive parts of the system
B) are trusted by companies
C) Both A and B
D) Neither A nor B
Answer: C
Q3) ICMP Echo messages are often used in ________.
A) IP address scanning
B) port scanning
C) Both A and B
D) Neither A nor B
Answer: A
To view all questions and flashcards with answers, click on the resource link above. Page 3
Available Study Resources on Quizplus for this Chatper
124 Verified Questions
124 Flashcards
Source URL: https://quizplus.com/quiz/27880
Sample Questions
Q1) Which of the following is not one of the three elements in the fraud and abuse triangle?
A) Opportunity
B) Resistance
C) Rationalization
D) Pressure
Answer: B
Q2) The book recommends hard-headed thinking about security ROI analysis.
A)True
B)False
Answer: False
Q3) In manual procedures, the segregation of duties ________.
A) reduces risk
B) increases risk by creating blind spots
C) increases risk by reducing accountability
D) can only be done safely through information technology
Answer: A
To view all questions and flashcards with answers, click on the resource link above.

Page 4

Available Study Resources on Quizplus for this Chatper
122 Verified Questions
122 Flashcards
Source URL: https://quizplus.com/quiz/27881
Sample Questions
Q1) In public key encryption for authentication, the verifier decrypts the ciphertext with the verifier's public key.
A)True
B)False
Answer: False
Q2) In checking the digital signature, the verifier ________.
A) decrypts the digital signature it received with the supplicant's public key to get the message digest
B) hashes the plaintext message with the same algorithm used by the sender to get the message digest
C) Both A and B
D) Neither A nor B
Answer: B
Q3) In authentication, the party trying to provide its identity to the other party is called the applicant.
A)True
B)False
Answer: False
To view all questions and flashcards with answers, click on the resource link above. Page 5
Available Study Resources on Quizplus for this Chatper
119 Verified Questions
119 Flashcards
Source URL: https://quizplus.com/quiz/27882
Questions
Q1) Many companies continue to use WEP to avoid the cost of reconfiguring all of their access points and clients to 802.11i and because WEP has not been fully cracked yet.
A)True
B)False
Q2) ________ is a good option if an attack is aimed at a single server because it keeps transmission lines at least partially open for other communication.
A) Rate limiting
B) False open
C) Black holing
D) None of the above
Q3) Access control is more of a problem for wired LANs than for wireless LANs.
A)True
B)False
Q4) A DoS attack makes a server or network unavailable by flooding it with attack packets.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above.

6

Available Study Resources on Quizplus for this Chatper
124 Verified Questions
124 Flashcards
Source URL: https://quizplus.com/quiz/27883
Sample Questions
Q1) In directory servers, ________.
A) there can only be one O in a directory server
B) there can only be one OU in a directory server
C) Both A and B
D) Neither A nor B
Q2) Which of the following is not one of the AAA controls?
A) Authentication
B) Auditing
C) Accuracy
D) Authorizations
Q3) ________ record(s) and analyzes what a person or program actually did.
A) Authentication
B) Authorizations
C) Auditing
D) All of the above
Q4) ________ can be used to supply power during long power outages.
A) Uninterruptable power supplies
B) Electrical generators
C) Both A and B
D) Neither A nor B
To view all questions and flashcards with answers, click on the resource link above. Page 7

Available Study Resources on Quizplus for this Chatper
100 Verified Questions
100 Flashcards
Source URL: https://quizplus.com/quiz/27884
Sample Questions
Q1) A connection opening is a state.
A)True
B)False
Q2) The last egress ACL rule in a border firewall is DENY ALL.
A)True
B)False
Q3) The firewall should go through vulnerability testing after each change.
A)True
B)False
Q4) If a firewall has to drop packets because it cannot keep up with traffic volume, this is
A) good because it will prevent possible attack packets from entering the network
B) bad because valid, non-attack packets will be dropped and this will effectively created a self-generated DOS attack
C) Both A and B
D) Neither A nor B
Q5) Creating ACLs is the most time-consuming part of firewall management. A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 8

Available Study Resources on Quizplus for this Chatper
100 Verified Questions
100 Flashcards
Source URL: https://quizplus.com/quiz/27885
Sample Questions
Q1) A Windows systems administrator should use the Administrator account ________.
A) as little as possible, and only when needed
B) as his or her main account, for auditability
C) his or her main account, for the permissions it provides
D) None of the above. The Windows systems administrator should never user the Administrator account.
Q2) In UNIX, the ________ permission allows the user to make changes.
A) execute
B) write
C) read
D) modify
Q3) Which of the following is a danger created by notebook computer loss or theft?
A) Loss of capital investment
B) Loss of sensitive data
C) Both A and B
D) Neither A nor B
Q4) UNIX offers more directory and file permissions than Windows.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 9

Available Study Resources on Quizplus for this Chatper
100 Verified Questions
100 Flashcards
Source URL: https://quizplus.com/quiz/27886
Sample Questions
Q1) Spammers use sticky spam, which presents their message as a graphical image.
A)True
B)False
Q2) The prevention of sensitive information from being sent out of a company is called
A) unified threat management
B) antivirus filtering
C) attachment deletion
D) extrusion prevention
Q3) Developers have permissions on the ________.
A) development server
B) testing server
C) production server
D) Both A and B
Q4) On a compromised computer, if you mistype the name of a URL, you may be taken to a malicious website even if you set your browser security to high.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above.
Page 10

Available Study Resources on Quizplus for this Chatper
108 Verified Questions
108 Flashcards
Source URL: https://quizplus.com/quiz/27887
Sample Questions
Q1) Magnetic tape is ________.
A) expensive to use
B) very fast
C) Both A and B
D) Neither A nor B
Q2) Training users what not to put into e-mail messages is the most effective method of avoiding problems during the legal discovery process.
A)True
B)False
Q3) Typically, the shadow storage space is nearly unlimited.
A)True
B)False
Q4) Data can be lost by ________.
A) mechanical failure
B) environmental casualties
C) malware
D) All of the above
Q5) Typically, having enough shadow backup space for a few days is sufficient.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 11

Available Study Resources on Quizplus for this Chatper
107 Verified Questions
107 Flashcards
Source URL: https://quizplus.com/quiz/27879
Sample Questions
Q1) If an IDS cannot process all of the packets it receives, it will ________ packets it cannot process.
A) drop
B) pass
C) quarantine
D) None of the above
Q2) HIDSs ________.
A) provide highly specific information about what happened on a particular host
B) cannot be compromised by hacking the host
C) Both A and B
D) Neither A nor B
Q3) Which of the following is the most effective alternative for disaster recovery backup?
A) Hot sites
B) Cold sites
C) CDP
D) All of the above
Q4) False positives are legitimate activities that are flagged as suspicious.
A)True
B)False
To view all questions and flashcards with answers, click on the resource link above. Page 12
Available Study Resources on Quizplus for this Chatper
91 Verified Questions
91 Flashcards
Source URL: https://quizplus.com/quiz/27888
Sample Questions
Q1) In a TCP half-open DoS attack, ________.
A) the attacker sends the final ACK of a session opening
B) the attacker sends an RST segment
C) Both A and B
D) Neither A nor B
Q2) The SNMP ________ command is very dangerous.
A) SET
B) GET
C) Both A and B
D) Neither A nor B
Q3) Physical and data link layer standards govern transmission in ________.
A) LANs
B) WANs
C) Both A and B
D) Neither A nor B
Q4) The main advantage of IPv6 compared to IPv4 is ________.
A) support for more IP addresses
B) faster transmission
C) higher security
D) None of the above.

Page 13
To view all questions and flashcards with answers, click on the resource link above.