Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Cybersecurity Final Exam Questions & Answers, Exams of Nursing

A comprehensive set of questions and answers for a final exam in the intro to cybersecurity course. It covers various topics such as encryption, hashing, biometrics, access control, cybersecurity principles, ethical paradigms, and relevant laws. The questions test the understanding of concepts like symmetric and asymmetric key encryption, steganography, multi-factor authentication, accountability, least privilege, blacklist, credential stuffing, open design, complete mediation, simplicity, weakest link, examine trust relationships, chokepoints, compartmentalization, social contract, virtue theory, right to privacy, third-party doctrine, computer fraud and abuse act, electronic communications privacy act, wiretap act, stored communications act, pen register act, economic espionage acts, jus ad bellum, jus in bello, shoulder surfing, keystroke logging, password stuffing, password spraying, authentication, and authorization.

Typology: Exams

2023/2024

Available from 04/26/2024

Talia00
Talia00 🇺🇸

5

(2)

1.1K documents

1 / 14

Toggle sidebar

Related documents


Partial preview of the text

Download Cybersecurity Final Exam Questions & Answers and more Exams Nursing in PDF only on Docsity! Intro to Cybersecurity Final Exam Question & Answers If Alice wants to send a message to Bob that only he can read, which key should she use to encrypt the message? - Correct Answers ✅Bob's Public Key If Alice wants to sign a message so that Bob knows that she wrote it, which key should she use? - Correct Answers ✅Alice's Private Key Which term best describes a traditional mono alphabetic substitution cipher? - Correct Answers ✅Symmetric key A hash acts as a ____ for a digital document - Correct Answers ✅Fingerprint This term describes a type of secret writing where the secret is hidden in plain sight. - Correct Answers ✅Steganography Computer cryptography boils down to the substation and transposition of 1s and 0s in a way that is _______. - Correct Answers ✅Reversible What law states that "anyone, from the most clueless amateur to the best cryptographer, can create an algorithm that he himself can't break? - Correct Answers ✅Schneier's Law Intro to Cybersecurity Final Exam Question & Answers If a cipher has a 56 bit key, and a computer can try 2^40 keys per second, how many seconds would it take to crack the cipher? - Correct Answers ✅2^15 Stream ciphers are a computerized implementation of this type of classic cipher. - Correct Answers ✅One time pad If users stuck to alphabetic characters only when choosing their passwords and chose 7 character passwords, how many different passwords were actually possible? - Correct Answers ✅2^33 Facial recognition scans area. way to authenticate a person based on Something they ___? - Correct Answers ✅Are ATM cards a way for the bank's cash dispensing machine to authenticate a person based on something they ____? - Correct Answers ✅Have Cedarville offers a service called Duo that alerts your cell phone for approval after you type in your password. This is an example of ... - Correct Answers ✅Multi-Factor authentication Authorization asks the question... - Correct Answers ✅Are you allowed to do that? Intro to Cybersecurity Final Exam Question & Answers Conducting a vulnerability assessment to identify the least-cost attack vector is an example of which cybersecurity principle? - Correct Answers ✅Weakest link Avoiding free downloads is an example of which cybersecurity principle? - Correct Answers ✅Examine trust relationsihps Making sure all traffic into and out of your network passes through one firewall is an example of which cybersecurity principle? - Correct Answers ✅Chokepoints Creating categories of sensitive information and storing each category on a different computer is an example of which cybersecurity principle? - Correct Answers ✅Compartmentalization This malware detection technique results in very few false positives. - Correct Answers ✅Signature detection Ethical arguments founded on _____ are more likely to be persuasive to diverse groups of people. - Correct Answers ✅Reason This ethical paradigm is mostly concerned about rights. - Correct Answers ✅Social contract Intro to Cybersecurity Final Exam Question & Answers This ethical paradigm is compatible with religions that teach the importance of high moral character. - Correct Answers ✅Virtue theory The 4th amendment to the US constitution defines which right? - Correct Answers ✅The Right to Privacy The 14th amendment to the US constitution defines which right? - Correct Answers ✅The Right to Due Process Activities that are ethical but illegal are... - Correct Answers ✅Civil disobedience candidates This states that if a person shares information with somebody else, they surrender their expectation of privacy... - Correct Answers ✅Third party doctrine Which of the following is not a criteria for determining whether a person violated the Computer Fraud and Abuse Act? - Correct Answers ✅The person knew the law Which act protects the privacy and information "at rest" with a third party? - Correct Answers ✅Stored Communications Act Intro to Cybersecurity Final Exam Question & Answers Cyberspace is now considered a domain of ______ along with 4 other domains - Correct Answers ✅Warfare This title of the US Code outlines the role of the US Armed Forces - Correct Answers ✅Title 10 Which type of cryptography replaces words in a message? - Correct Answers ✅Code Which type of cryptography replaces letters in a message? - Correct Answers ✅Cipher Which type of cryptography "hides the message in plain sight"? - Correct Answers ✅Steganography What was the name for the Caesar cipher with a key of 13? - Correct Answers ✅ROT-13 How many permutations of the alphabet are possible? - Correct Answers ✅2^88 What is the only 100% secure cipher in existence? - Correct Answers ✅One time pad Intro to Cybersecurity Final Exam Question & Answers What provides moral guidance to professionals? - Correct Answers ✅Code of ethics Activites that are unethical and legal are ____ - Correct Answers ✅Ethical grey area candidate Which branch of government is responsible for creating laws? - Correct Answers ✅Legislative Which branch of the government is responsible for enforcing the laws? - Correct Answers ✅Presidency Which branch of the government is responsible for interpreting the laws? - Correct Answers ✅Judiciary Which right gives a person accused of a crime notice, an opportunity to be heard, and an impartial tribunal? - Correct Answers ✅The Right to Due Process Which right can be inferred from the Fourth Amendment, protecting people against "unreasonable searches and seizures"? - Correct Answers ✅The Right to Privacy Intro to Cybersecurity Final Exam Question & Answers Which Title includes the Computer Fraud and Abuse Act? - Correct Answers ✅Title 18 (Crimes) Which Title refers to War and National Defense? - Correct Answers ✅Title 50 Which Act is the umbrella "anti-hacking" law? - Correct Answers ✅Computer Fraud and Abuse Act Which Act limits the government's ability to obtain email, monitor networks, and obtain Internet traffic logs? - Correct Answers ✅Electronic Communications Privacy Act Which Act restricts the government's ability to tap phone calls? - Correct Answers ✅Wiretap Act Which Act regulates the government's access to emails or cloud content stored on a 3rd party's computer/server/cloud? - Correct Answers ✅Stored Communications Act Which Act restricts access to phone and email message metadata? - Correct Answers ✅Pen Register Act Intro to Cybersecurity Final Exam Question & Answers Which Act protects trade secrets? - Correct Answers ✅Economic Espionage Acts Which section of the Economic Espionage Acts prohibits economic espionage for a foreign government? - Correct Answers ✅1831 Which section of the Economic Espionage Acts prohibits the theft of trade secrets to benefit one company at the expense of another? - Correct Answers ✅1832 What is SIGINT short for? - Correct Answers ✅Signals Intelligence Which latin term in international laws outlines the conditions for when it is justified for a State to enter into war with another State? - Correct Answers ✅Jus ad bellum (Right to battle) Which latin term in international law refers to the acceptable conduct of war? - Correct Answers ✅Jus in bello (Right in war) Which password attack occurs when someone sees you type in your password? - Correct Answers ✅Shoulder surfing