Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Cyber Security 2025/2026 Exam Study Guide

Rating
-
Sold
-
Pages
14
Grade
A+
Uploaded on
18-10-2025
Written in
2025/2026

Cyber Security 2025/2026 Exam Study Guide Introduction: This guide covers the critical domains of the modern cybersecurity landscape, reflecting the updated 2025/2026 syllabus. It emphasizes cloud security, AI/ML in cyber, zero-trust architectures, and modern privacy regulations. Use these questions to test your knowledge and identify areas for further study. Domain 1: Fundamentals of Cybersecurity & Governance 1. What are the three core principles of the CIA Triad? ANSWER Confidentiality, Integrity, and Availability. 2. How does the "AAA" framework in security control access? ANSWER Authentication, Authorization, and Accounting. 3. What is the primary purpose of a Risk Assessment? ANSWER To identify, analyze, and evaluate cybersecurity risks to an organization's operations and assets. 4. Differentiate between a vulnerability, a threat, and a risk. ANSWER A vulnerability is a weakness, a threat is an actor that can exploit the weakness, and risk is the potential for loss or damage when the threat exploits the vulnerability. 5. What is the key difference between a policy, a standard, and a procedure? ANSWER A policy is a high-level statement of management intent, a standard is a mandatory rule to support the policy, and a procedure is a step-by-step guide to implement the standard. 6. What regulation focuses on the privacy and security of health data in the United States? ANSWER HIPAA (Health Insurance Portability and Accountability Act). 7. What is the primary goal of the GDPR? ANSWER To protect the personal data and privacy of individuals within the European Union. 8. What does the term "defense in depth" refer to? ANSWER A layered security approach that uses multiple, redundant controls to protect assets. 9. What is the purpose of a Business Impact Analysis (BIA)? ANSWER To identify and evaluate the potential effects of an interruption to critical business operations. 10. What framework, developed by NIST, provides a policy framework for improving critical infrastructure cybersecurity? ANSWER The NIST Cybersecurity Framework (CSF). Domain 2: Network Security & Zero Trust 11. What is the fundamental principle of a Zero Trust architecture? ANSWER "Never trust, always verify." No user or device, inside or outside the network, is trusted by default. 12. How does a VPN provide secure remote access? ANSWER By creating an encrypted tunnel over a public network (like the internet) to securely connect a remote user to a private network. 13. What is the primary function of a firewall? ANSWER To monitor and control incoming and outgoing network traffic based on predetermined security rules.

Show more Read less
Institution
Cyber Security 2025
Module
Cyber Security 2025

Content preview

Cyber Security 2025/2026 Exam Study Guide
Introduction: This guide covers the critical domains of the modern cybersecurity
landscape, reflecting the updated 2025/2026 syllabus. It emphasizes cloud security,
AI/ML in cyber, zero-trust architectures, and modern privacy regulations. Use these
questions to test your knowledge and identify areas for further study.




Domain 1: Fundamentals of Cybersecurity & Governance
1. What are the three core principles of the CIA Triad?
ANSWER ✓ Confidentiality, Integrity, and Availability.

2. How does the "AAA" framework in security control access?
ANSWER ✓ Authentication, Authorization, and Accounting.

3. What is the primary purpose of a Risk Assessment?
ANSWER ✓ To identify, analyze, and evaluate cybersecurity risks to an organization's
operations and assets.

4. Differentiate between a vulnerability, a threat, and a risk.
ANSWER ✓ A vulnerability is a weakness, a threat is an actor that can exploit the
weakness, and risk is the potential for loss or damage when the threat exploits the
vulnerability.

5. What is the key difference between a policy, a standard, and a procedure?
ANSWER ✓ A policy is a high-level statement of management intent, a standard is a
mandatory rule to support the policy, and a procedure is a step-by-step guide to
implement the standard.

6. What regulation focuses on the privacy and security of health data in the United
States?
ANSWER ✓ HIPAA (Health Insurance Portability and Accountability Act).

7. What is the primary goal of the GDPR?
ANSWER ✓ To protect the personal data and privacy of individuals within the European
Union.

, 8. What does the term "defense in depth" refer to?
ANSWER ✓ A layered security approach that uses multiple, redundant controls to
protect assets.

9. What is the purpose of a Business Impact Analysis (BIA)?
ANSWER ✓ To identify and evaluate the potential effects of an interruption to critical
business operations.

10. What framework, developed by NIST, provides a policy framework for
improving critical infrastructure cybersecurity?
ANSWER ✓ The NIST Cybersecurity Framework (CSF).




Domain 2: Network Security & Zero Trust
11. What is the fundamental principle of a Zero Trust architecture?
ANSWER ✓ "Never trust, always verify." No user or device, inside or outside the network,
is trusted by default.

12. How does a VPN provide secure remote access?
ANSWER ✓ By creating an encrypted tunnel over a public network (like the internet) to
securely connect a remote user to a private network.

13. What is the primary function of a firewall?
ANSWER ✓ To monitor and control incoming and outgoing network traffic based on
predetermined security rules.

14. Differentiate between an IDS and an IPS.
ANSWER ✓ An Intrusion Detection System (IDS) monitors and alerts on suspicious
activity, while an Intrusion Prevention System (IPS) actively blocks and prevents the
detected threats.

15. What network protocol is considered insecure and should be replaced by its
encrypted counterpart, SSH?
ANSWER ✓ Telnet.

16. What is a DMZ (Demilitarized Zone) in network security?
ANSWER ✓ A physical or logical subnetwork that contains and exposes an
organization's external-facing services to a larger, untrusted network, typically the
internet.

Written for

Institution
Cyber Security 2025
Module
Cyber Security 2025

Document information

Uploaded on
October 18, 2025
Number of pages
14
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers
$16.19
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
SmartscoreAaron Chicago State University
View profile
Follow You need to be logged in order to follow users or courses
Sold
68
Member since
1 year
Number of followers
6
Documents
3777
Last sold
4 days ago
SMARTSCORES LIBRARY

Get top-tier academic support for Psychology, Nursing, Business, Engineering, HRM, Math, and more. Our team of professional tutors delivers high-quality homework, quiz, and exam assistance—ensuring scholarly excellence and grade-boosting results. Trust our collaborative expertise to help you succeed in any course at U.S.A Institutions.

3.5

6 reviews

5
3
4
1
3
0
2
0
1
2

Trending documents

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions