Use these questions to help you prepare for assessments or exams. Note that these questions are not specifically the ones that will be on either the assessment or exam; the goal of answering these is for you to go back into the readings and gain a deeper understanding.
- What is a Rootkit and what does it do?
- Why is Data Integrity important in Cybersecurity? Knowing this, why do we need to authenticate users with username and passwords?
- What is a Trojan Horse Attack and what is its main limitation?
- Part of the Plan-Protect-Respond Cycle is the Planning Stage. Why would Penetration Testing be useful at this specific stage?
- What is a Man-in-the-Middle Attack? What kind of information does this attack target?
- What is the overall goal of the 3 main components of Cybersecurity Threat Mitigation?
Leave a Reply
You must be logged in to post a comment.