100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
IBM Cybersecurity Analyst Professional Certificate Assessment Exam 70 Questions and Correct Answers/Newest Version $22.49   Add to cart

Exam (elaborations)

IBM Cybersecurity Analyst Professional Certificate Assessment Exam 70 Questions and Correct Answers/Newest Version

 4 views  0 purchase
  • Course
  • IBM Cybersecurity Analyst Professional Certificate
  • Institution
  • IBM Cybersecurity Analyst Professional Certificate

IBM Cybersecurity Analyst Professional Certificate Assessment Exam 70 Questions and Correct Answers/Newest Version 1. Question 1 Select the answer the fills in the blanks in the correct order. A weakness in a system is a/an . The potential danger associated with this is a/an that becomes a/...

[Show more]

Preview 4 out of 34  pages

  • November 11, 2024
  • 34
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • IBM Cybersecurity Analyst Professional Certificate
  • IBM Cybersecurity Analyst Professional Certificate
avatar-seller
Wiseman
IBM Cybersecurity Analyst Professional Certificate Assessment
Exam 70 Questions and Correct Answers/Newest Version
1.
Question 1
Select the answer the fills in the blanks in the correct order.

A weakness in a system is a/an . The potential danger associated with this is a/an
that becomes a/an
when attacked by a bad actor.

point


threat, exposure, risk



threat actor, vulnerability, exposure



risk, exploit, threat



vulnerability, threat, exploit

Correct
Correct!

2.
Question 2
Putting locks on a door is an example of which type of control?

point


Preventative



Detective



Corrective



All of the above

Correct
Correct!

3.
Question 3
Which of the following defines a security threat?

, point


Any potential danger capable of exploiting a weakness in a system



The likelihood that the weakness in a system will be exploited



One instance of a weakness being exploited



A weakness in a system that could be exploited by a bad actor

Correct
Correct!

4.
Question 4
Implement a filter to remove flooded packets before they reach the host is a
countermeasure to which form of attack?

point


A Denial of Service (DoS) attack



An IP Spoofing attack



A Phishing attack



All of the above

Correct
Correct!

5.
Question 5
Trudy intercepts a plain text message sent by Alice to Bob but in no way interferes
with its delivery. Which aspect of the CIA Triad was violated?

point


Confidentiality

,Integrity



Availability



All of the above

Correct
Correct!

6.
Question 6
Trudy intercepts a romantic plain-text message from Alice to her boyfriend Sam. The
message upsets Trudy so she forwards it to Bob, making it look like Alice intended it
for Bob from the beginning. Which aspect of the CIA Triad has Trudy violated?

point


Confidentiality



Integrity



Availability



All of the above

Correct
Correct!

7.
Question 7
Which factor contributes most to the strength of an encryption system?

point


The number of private keys used by the system



The secrecy of the encryption algorithm used



The length of the encryption key used

, How many people have access to your public key

Incorrect
Incorrect, this material was covered in the course Introduction to Cybersecurity Tools
& Cyber Attacks, Week 4 - An overview of key security tools

8.
Question 8
What is an advantage asymmetric key encryption has over symmetric key encryption?

point


Asymmetric keys can be exchanged more securely than symmetric keys



Asymmetric key encryption is faster than symmetric key encryption



Asymmetric key encryption is harder to break than symmetric key encryption



Asymmetric key encryption provides better security against Man-in-the-middle attacks
than is possible with symmetric key encryption

Incorrect
9.
Question 9
Which three (3) of the following are key ITIL processes? (Select 3)

point


Incident Management

Correct
Partially correct! This is 1 of the 3 correct answers



Problem Management

Correct
Partially correct! This is 1 of the 3 correct answers



Change Management

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller Wiseman. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $22.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

81298 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$22.49
  • (0)
  Add to cart