100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CYBER SECURITY REVISED QUESTIONS AND ANSWERS-

Beoordeling
-
Verkocht
-
Pagina's
7
Cijfer
A+
Geüpload op
10-11-2025
Geschreven in
2025/2026

CYBER SECURITY REVISED QUESTIONS AND ANSWERS-18 - C










Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Documentinformatie

Geüpload op
10 november 2025
Aantal pagina's
7
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

CYBER SECURITY REVISED QUESTIONS AND ANSWERS#18
Access management - correct answer Managing the access to a computer system/network. It
includes procedures such as account administration, account maintenance, account monitoring
and the revocation of an account.


Account lockout - correct answer A software security method performed by operating system
software that locks any account when a user fails a login attempt more than a set number of
times. For example, system software can be set up to lock an account for several hours if the
user fails the login three consecutive times in a set time frame.


Anti-malware - correct answer Software designed to prevent, detect and eradicate malicious
software, such as a virus or a worm


Anomaly based - correct answer Software that is designed to detect computer intrusions and
misuse by monitoring system activity and classifying it as either normal or anomalous.


Asset - correct answer Something that is of value to a person, an organisation or a state, e.g.
Data, finance and secrets that should be secured against cyber security incidents.


Attacker - correct answer Individuals or organisations that target computer systems/networks
illegally.


Audit trail - correct answer A record of activities on a computer system/network, for example, a
record of modifications to data or access to parts of a system/network.


Availability - correct answer Data/information stored on a computer system/network must be
available to authorised users and organisations and be protected from unauthorised deletion.


Biometric access - correct answer Access to a computer system/network using technologies
that measure and analyse human body characteristics for authentication purposes, such as
DNA, fingerprints, retinas, voice patterns, facial patterns and hand measurements.

, Botnet - correct answer A network of computers infected with malicious software and
controlled without the owners' knowledge, for example, to send spam or hoax emails.


Business continuity plan - correct answer A plan to continue operations that an organisation will
follow if it is affected by a cyber security incident


Confidentiality - correct answer Information stored on a computer system/network must be
protected against unintended or unauthorised access. Data confidentiality is a measure of the
ability of a system to protect its data.


Cyber criminal - correct answer An individual who commits illegal activities using computers
and the Internet.


Cyber dependant - correct answer Illegal activities dependent on the use of computers and the
Internet, such as hacking or the distribution of malware on a network.


Cyber enabled - correct answer Illegal activities that could be undertaken without the use of
computers, such as fraud but that are enabled by the use of computers, such as fraudulently
obtaining money for goods online.


Cyber security - correct answer Refers to technologies, processes and practices designed to
protect computers, networks, software and data from attack, damage or unauthorised access
and aims to protect data confidentiality, integrity and availability.


Cyber security incident - correct answer An unwanted/unexpected event, such as an intrusion
into a computer system/network, such as the spread of malware.


Cyber security incident report - correct answer A report that documents the details of a cyber
security incident, such as the type of incident, when it occurred, how it was performed, etc.
$9.76
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten

Maak kennis met de verkoper
Seller avatar
simonnjaramba

Ook beschikbaar in voordeelbundel

Thumbnail
Voordeelbundel
CYBER SECURITY REVISED QUESTIONS WITH CERTIFIED ANSWERS
-
16 2025
$ 176.33 Meer info

Maak kennis met de verkoper

Seller avatar
simonnjaramba Teachme2-tutor
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
Nieuw op Stuvia
Lid sinds
2 maanden
Aantal volgers
0
Documenten
113
Laatst verkocht
-

0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen