logo

Crowdly

CMP4298 Cyber Security Fundamentals A S2 2024/5

Looking for CMP4298 Cyber Security Fundamentals A S2 2024/5 test answers and solutions? Browse our comprehensive collection of verified answers for CMP4298 Cyber Security Fundamentals A S2 2024/5 at moodle.bcu.ac.uk.

Get instant access to accurate answers and detailed explanations for your course questions. Our community-driven platform helps students succeed!

What is the best way to avoid getting spyware on a machine?

100%
0%
0%
0%
View this question

You are configuring access settings to require employees in your

organization to authenticate first before accessing certain web pages.

Which requirement of information security is addressed through

this configuration?

0%
100%
0%
0%
View this question

A set of changes done to

any program or application with the aim of updating, fixing or improving

it is often referred to as what?

0%
0%
100%
0%
View this question

What type of attack allows an

attacker to use a brute-force approach?

100%
0%
0%
0%
View this question

Question:

Describe the scanning technique you would choose and how it helps in identifying whether a port is open, closed, or filtered during the network scan.

Scenario:

You're conducting a network scan to assess the security posture of your organization's infrastructure. To efficiently determine the status of ports on the target systems, you decide to utilize Nmap and opt for a specific scanning technique.

View this question

Question:

Discuss one action related to password security that you would advise against and explain why it's not recommended

Scenario:

You're leading a cybersecurity awareness session within your organization, focusing on password security best practices. You're emphasizing the importance of avoiding certain actions to mitigate security risks.

View this question

What does the acronym "VPN" stand for in the context of cybersecurity?

View this question

What is the term for a type of malware that spreads rapidly across a network?

View this question

Which of the following is NOT a best practice for password security?

View this question

Which of the following is NOT an example of social engineering in cybersecurity?

View this question

Want instant access to all verified answers on moodle.bcu.ac.uk?

Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!