100% Zufriedenheitsgarantie Sofort verfügbar nach Zahlung Sowohl online als auch als PDF Du bist an nichts gebunden 4,6 TrustPilot
logo-home
Prüfung

CYBER SECURITY REVISED QUESTIONS AND ANSWERS-

Bewertung
-
Verkauft
-
seiten
7
Klasse
A+
Hochgeladen auf
10-11-2025
geschrieben in
2025/2026

CYBER SECURITY REVISED QUESTIONS AND ANSWERS-18 - C

Hochschule
Kurs









Ups! Dein Dokument kann gerade nicht geladen werden. Versuch es erneut oder kontaktiere den Support.

Schule, Studium & Fach

Hochschule
Kurs

Dokument Information

Hochgeladen auf
10. november 2025
Anzahl der Seiten
7
geschrieben in
2025/2026
Typ
Prüfung
Enthält
Fragen & Antworten

Themen

Inhaltsvorschau

CYBER SECURITY REVISED QUESTIONS AND ANSWERS#18
Access management - correct answer Managing the access to a computer system/network. It
includes procedures such as account administration, account maintenance, account monitoring
and the revocation of an account.


Account lockout - correct answer A software security method performed by operating system
software that locks any account when a user fails a login attempt more than a set number of
times. For example, system software can be set up to lock an account for several hours if the
user fails the login three consecutive times in a set time frame.


Anti-malware - correct answer Software designed to prevent, detect and eradicate malicious
software, such as a virus or a worm


Anomaly based - correct answer Software that is designed to detect computer intrusions and
misuse by monitoring system activity and classifying it as either normal or anomalous.


Asset - correct answer Something that is of value to a person, an organisation or a state, e.g.
Data, finance and secrets that should be secured against cyber security incidents.


Attacker - correct answer Individuals or organisations that target computer systems/networks
illegally.


Audit trail - correct answer A record of activities on a computer system/network, for example, a
record of modifications to data or access to parts of a system/network.


Availability - correct answer Data/information stored on a computer system/network must be
available to authorised users and organisations and be protected from unauthorised deletion.


Biometric access - correct answer Access to a computer system/network using technologies
that measure and analyse human body characteristics for authentication purposes, such as
DNA, fingerprints, retinas, voice patterns, facial patterns and hand measurements.

, Botnet - correct answer A network of computers infected with malicious software and
controlled without the owners' knowledge, for example, to send spam or hoax emails.


Business continuity plan - correct answer A plan to continue operations that an organisation will
follow if it is affected by a cyber security incident


Confidentiality - correct answer Information stored on a computer system/network must be
protected against unintended or unauthorised access. Data confidentiality is a measure of the
ability of a system to protect its data.


Cyber criminal - correct answer An individual who commits illegal activities using computers
and the Internet.


Cyber dependant - correct answer Illegal activities dependent on the use of computers and the
Internet, such as hacking or the distribution of malware on a network.


Cyber enabled - correct answer Illegal activities that could be undertaken without the use of
computers, such as fraud but that are enabled by the use of computers, such as fraudulently
obtaining money for goods online.


Cyber security - correct answer Refers to technologies, processes and practices designed to
protect computers, networks, software and data from attack, damage or unauthorised access
and aims to protect data confidentiality, integrity and availability.


Cyber security incident - correct answer An unwanted/unexpected event, such as an intrusion
into a computer system/network, such as the spread of malware.


Cyber security incident report - correct answer A report that documents the details of a cyber
security incident, such as the type of incident, when it occurred, how it was performed, etc.
8,16 €
Vollständigen Zugriff auf das Dokument erhalten:

100% Zufriedenheitsgarantie
Sofort verfügbar nach Zahlung
Sowohl online als auch als PDF
Du bist an nichts gebunden

Lerne den Verkäufer kennen
Seller avatar
simonnjaramba

Ebenfalls erhältlich im paket-deal

Lerne den Verkäufer kennen

Seller avatar
simonnjaramba Teachme2-tutor
Folgen Sie müssen sich einloggen, um Studenten oder Kursen zu folgen.
Verkauft
Neu auf Stuvia
Mitglied seit
2 Jahren
Anzahl der Follower
0
Dokumente
113
Zuletzt verkauft
-

0,0

0 rezensionen

5
0
4
0
3
0
2
0
1
0

Kürzlich von dir angesehen.

Warum sich Studierende für Stuvia entscheiden

on Mitstudent*innen erstellt, durch Bewertungen verifiziert

Geschrieben von Student*innen, die bestanden haben und bewertet von anderen, die diese Studiendokumente verwendet haben.

Nicht zufrieden? Wähle ein anderes Dokument

Kein Problem! Du kannst direkt ein anderes Dokument wählen, das besser zu dem passt, was du suchst.

Bezahle wie du möchtest, fange sofort an zu lernen

Kein Abonnement, keine Verpflichtungen. Bezahle wie gewohnt per Kreditkarte oder Sofort und lade dein PDF-Dokument sofort herunter.

Student with book image

“Gekauft, heruntergeladen und bestanden. So einfach kann es sein.”

Alisha Student

Häufig gestellte Fragen