100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Cyber Security Technical Prep Questions & Answers

Rating
-
Sold
-
Pages
27
Grade
A+
Uploaded on
08-11-2025
Written in
2025/2026

Secure yourself with this ultimate set of techinical questions and answers. This comprehensive digital study guide covers all the essential topics you need to know.

Institution
Cyber Security Specialist
Course
Cyber Security Specialist










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Cyber Security Specialist
Course
Cyber Security Specialist

Document information

Uploaded on
November 8, 2025
File latest updated on
November 8, 2025
Number of pages
27
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Cyber Security Technical Questions Q &A


Compiled by Professor Kevin

, Cyber security refers to the protection of internet-
connected systems such as software, hardware,
Define Cyber security? electronic data, etc., from cyber-attacks. In a
computing text, it is referred to as protection
Against unauthorized access.

Cryptography is a method to transform and transmit
confidential data in an encoded way to protect the
What is Cryptography?
information from third parties for whom data is not
Authorized.

Threat: Someone with the potential to cause harm
by damaging or destroying the official data of a
System or organization.
Ex: Phishing attack
Vulnerability: It refers to weaknesses in a system that
What is the difference
makes threat outcomes more possible and even
between Threat,
More dangerous.
Vulnerability and Risk?
Ex: SQL injections, cross-site scripting
Risk: It refers to a combination of threat probability
And impact/loss. In simple terms, it is related to
potential damage or loss when a threat exploits the
Vulnerability.

, Cross-Site Scripting is also known as a client-side
injection attack, which aims at executing malicious
scripts on a victim's web browser by injecting
Malicious code.
What is Cross-Site
The following practices can prevent Cross-Site
Scripting and how it can
Scripting:
Be prevented?
Encoding special characters
Using XSS HTML Filter



Validating user inputs
Using Anti-XSS services/tools

See IA Botnet is a group of internet-connected
devices such as servers, PCs, mobile devices, etc.,
That are affected and controlled by malware.
What is a Botnet? It is used for stealing data, sending spam,
performing distributed denial-of-service attack
(DDoS attack), and more, and also to enable the
User to access the device and its connection. Mage

CIA (confidentiality, integrity, and availability) triad is
a model designed to handle policies for information
Security within an organization.
Confidentiality - A collection of rules that limits
What is a CIA triad? Access to information.
Integrity - It assures the information is trustworthy
And reliable.
Availability - It provides reliable access to data for
Authorized people.

Both hashing and encryption are used to convert
Readable data into an unreadable format. The
What is the difference
significant difference is that encrypted data can be
between hashing and
transformed into original data by decryption,
Encryption?
whereas hashed data cannot be processed back to
The original data.
$9.49
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
Gradestar

Get to know the seller

Seller avatar
Gradestar Light Star
View profile
Follow You need to be logged in order to follow users or courses
Sold
New on Stuvia
Member since
1 month
Number of followers
0
Documents
15
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions