Professional Documents
Culture Documents
Answer-Cyber Security Certification Question
Answer-Cyber Security Certification Question
NAAC ACCREDITED
Q4. Which aspect of the CIA triad ensures that only authorized users can access information?
Integrity
Availability
Reliability
Confidentiality
Q5. Which aspect of the CIA triad ensures that information remains accurate?
Confidentiality
Integrity
Availability
Usability
Q6. Which aspect of the CIA triad ensures that information and systems are accessible to authorized
users when needed anytime anywhere?
Confidentiality
Integrity
Availability
Security
Q10. What is a common cyber threat that involves deceptive emails designed to trick users into
revealing personal information?
Phishing
Malware
Hacking
Denial-of-service attacks
Q11. What type of malware spreads automatically across networks without user interaction?
Viruses
Trojans
Worms
Spyware
Q23. What is the goal of the Information Gathering (Reconnaissance) phase in ethical hacking?
To gather as much information as possible about the target system and its environment
To exploit identified vulnerabilities
To scan the target system for open ports
To cover tracks and erase activity logs
Q24. During which phase does an ethical hacker use specialized tools to scan the target system for
vulnerabilities?
Scanning
Information Gathering
Enumeration
Exploitation
Q25. What is the ethical hacker's goal during the Exploitation phase?
To understand how an attacker could exploit the vulnerability and the potential impact
To gather as much information as possible about the target system
To identify specific versions of software
To erase activity logs and avoid detection
****