100% Zufriedenheitsgarantie Sofort verfügbar nach Zahlung Sowohl online als auch als PDF Du bist an nichts gebunden 4,6 TrustPilot
logo-home
Prüfung

INTRODUCTION TO CYBERSECURITY QUESTIONS AND ANSWERS-16.docx

Bewertung
-
Verkauft
-
seiten
76
Klasse
A+
Hochgeladen auf
06-11-2025
geschrieben in
2025/2026

INTRODUCTION TO CYBERSECURITY QUESTIONS AND ANSWERS-

Hochschule
Cyber Security Specialist
Kurs
Cyber Security Specialist











Ups! Dein Dokument kann gerade nicht geladen werden. Versuch es erneut oder kontaktiere den Support.

Schule, Studium & Fach

Hochschule
Cyber Security Specialist
Kurs
Cyber Security Specialist

Dokument Information

Hochgeladen auf
6. november 2025
Anzahl der Seiten
76
geschrieben in
2025/2026
Typ
Prüfung
Enthält
Fragen & Antworten

Themen

Inhaltsvorschau

INTRODUCTION TO CYBERSECURITY QUESTIONS AND ANSWERS#16
What is cybersecurity - correct answer preventing the unauthorized access to data and
information systems


What three goals does cybersecurity have - correct answer confidentiality, integrity,
accessibility


What is the confidentiality goal of cybersecurity - correct answer ensuring no one with
authorized can access information


What is the integrity goal of cybersecurity - correct answer ensuring the data hasn't been
manipulated and is accurate


What is the availability goal of cybersecurity - correct answer ensuring the systems are available
to the end users


What are the three main methods or controls that shape cybersecurity? - correct answer
people, process, technology


What is the role of people in cybersecurity - correct answer - giving people the skills and
information to implement an effective cybersecurity program
- training, awareness, building skills


What is process in cybersecurity - correct answer the policies and organizational procedures
used to implement and manage the cybersecurity program


What role does technology play in cybersecurity - correct answer the tools or controls used to
implement the cybersecurity lifecycle

,What is the cybersecurity lifecycle - correct answer the components of cybersecurity according
to nist


What are the nist components of the cybersecurity lifecycle - correct answer identify, monitor,
protect, detect, respond, recover


What is the old model to approach cybersecurity - correct answer the perimeter model (hard
shell, soft inside)


Why is the perimeter model not fully effective in cybersecurity - correct answer - the perimeter
is not perfect and is only one layer
- you have to violate the perimeter all the time to share information between authorized users
- too many doors and windows


What is the identify function in the nist model? - correct answer identify
The identify function assists in developing an organizational understanding to managing
cybersecurity risk to systems, people, assets, data, and capabilities. Understanding the business
context, the resources that support critical functions, and the related cybersecurity risks
enables an organization to focus and prioritize its efforts, consistent with its risk management
strategy and business needs.


Examples of outcome categories within this function include:


Identifying physical and software assets within the organization to establish the basis of an
asset management program


Identifying the business environment the organization supports including the organization's
role in the supply chain, and the organizations place in the critical infrastructure sector

,Identifying cybersecurity policies established within the organization to define the governance
program as well as identifying legal and regulatory requirements regarding the cybersecurity
capabilities of the organization


Identifying asset vulnerabilities, threats to internal and external organizational resources, and
risk response activities as a basis for the organizations risk assessment


Identifying a risk management strategy for the organization including establishing risk
tolerances
Identifying a supply chain risk management strategy including priorities, constraints, risk
tolerances, and assumptions used to support risk decisions associated with managing supply
chain risks


What is the protect function in the nist model - correct answer the protect function outlines
appropriate safeguards to ensure delivery of critical infrastructure services. The protect
function supports the ability to limit or contain the impact of a potential cybersecurity event.


Examples of outcome categories within this function include:


Protections for identity management and access control within the organization including
physical and remote access


Empowering staff within the organization through awareness and training including role based
and privileged user training


Establishing data security protection consistent with the organization's risk strategy to protect
the confidentiality, integrity, and availability of information


Implementing information protection processes and procedures to maintain and manage the
protections of information systems and assets
Protecting organizational resources through

, Maintenance, including remote maintenance, activities


Managing protective technology to ensure the security and resilience of systems and assists are
consistent with organizational policies, procedures, and agreements


What is the detect function in the nist model? - correct answer detect: identifying the
occurrence of a cybersecurity event (an incursion or attempted incursion) in a timely manner


Details:


The detect function defines the appropriate activities to identify the occurrence of a
cybersecurity event. The detect function enables timely discovery of cybersecurity events.


Examples of outcome categories within this function include:


Ensuring anomalies and events are detected, and their potential impact is understood
Implementing security continuous monitoring capabilities to monitor cybersecurity events and
verify the effectiveness of protective measures including network and physical activities
Maintaining detection processes to provide awareness of anomalous events


What is the respond function in the nist model? - correct answer to take action regarding .
Detected cybersecurity incident to minimize impact


Details:


The respond function includes appropriate activities to take action regarding a detected
cybersecurity incident. The respond function supports the ability to contain the impact of a
potential cybersecurity incident.
8,66 €
Vollständigen Zugriff auf das Dokument erhalten:

100% Zufriedenheitsgarantie
Sofort verfügbar nach Zahlung
Sowohl online als auch als PDF
Du bist an nichts gebunden

Lerne den Verkäufer kennen
Seller avatar
simonnjaramba

Ebenfalls erhältlich im paket-deal

Lerne den Verkäufer kennen

Seller avatar
simonnjaramba Teachme2-tutor
Folgen Sie müssen sich einloggen, um Studenten oder Kursen zu folgen.
Verkauft
Neu auf Stuvia
Mitglied seit
2 Jahren
Anzahl der Follower
0
Dokumente
113
Zuletzt verkauft
-

0,0

0 rezensionen

5
0
4
0
3
0
2
0
1
0

Kürzlich von dir angesehen.

Warum sich Studierende für Stuvia entscheiden

on Mitstudent*innen erstellt, durch Bewertungen verifiziert

Geschrieben von Student*innen, die bestanden haben und bewertet von anderen, die diese Studiendokumente verwendet haben.

Nicht zufrieden? Wähle ein anderes Dokument

Kein Problem! Du kannst direkt ein anderes Dokument wählen, das besser zu dem passt, was du suchst.

Bezahle wie du möchtest, fange sofort an zu lernen

Kein Abonnement, keine Verpflichtungen. Bezahle wie gewohnt per Kreditkarte oder Sofort und lade dein PDF-Dokument sofort herunter.

Student with book image

“Gekauft, heruntergeladen und bestanden. So einfach kann es sein.”

Alisha Student

Häufig gestellte Fragen