100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CYBERSECURITY PREDICTED QUESTIONS AND CORRECT ANSWERS

Beoordeling
-
Verkocht
-
Pagina's
19
Cijfer
A+
Geüpload op
10-11-2025
Geschreven in
2025/2026

CYBERSECURITY PREDICTED QUESTIONS AND CORRECT ANSWERS

Voorbeeld van de inhoud

CYBERSECURITY PREDICTED QUESTIONS AND CORRECT ANSWERS #6
Virus - correct answer A piece of code that is capable of copying itself and typically has a
detrimental effect, such as corrupting the system or destroying data


Social Engineering - correct answer Tricking/Deceiving Someone into giving you private
information or data


Backdoor - correct answer Attacker gets access by using an exploit to access the system


Spyware - correct answer software that obtains information about another computer's
activities without knowledge of the user


Spear Phishing Attack - correct answer is an email or electronic communications scam targeted
towards a specific individual, organization or business. Although often intended to steal data for
malicious purposes, cybercriminals may also intend to install malware on a targeted user's
computer.


DOS - correct answer Denial of Service: an attempt to make a machine or network resource
unavailable to its intended users, such as to temporarily or indefinitely interrupt or suspend
services of a host connected to the Internet.


DDOS - correct answer Distributed Denial of Service: occurs when multiple systems flood the
bandwidth or resources of a targeted system, usually one or more web servers. Such an attack
is often the result of multiple compromised systems (for example, a botnet) flooding the
targeted system with traffic.


Botnet - correct answer a network of private computers infected with malicious software and
controlled as a group without the owners' knowledge, used to send spam messages, ddos
attacks, mine for cryptocurrency, and more


Dumpster Diving - correct answer looking through trash to obtain sensitive information

,Ransomware - correct answer malicious software that blocks access to computer until an
amount of money is paid


Malware - correct answer software intended to harm computers, networks, people, or
businesses


Drive-by Download - correct answer Downloads installed by just passing through an infected
webpage


E-mail flooding - correct answer sending many emails to a target to flood the inbox and take
down the server


Trojan Horse - correct answer a virus disguised as real software, to make it appear harmless so
victims download and run it


Worm - correct answer a self-replicating virus that does not usually alter files but resides in
active memory and duplicates itself. Worms use parts of an operating system that are
automatic and usually invisible to the user. It is common for worms to be noticed only when
their uncontrolled replication consumes system resources, slowing or halting other tasks.


DNS spoofing - correct answer also referred to as DNS cache poisoning, is a form of computer
hacking in which corrupt Domain Name System data is introduced into a DNS resolver's cache,
causing the name server to return an incorrect IP address, which results in diverting traffic to
the attacker's computer (or any other computer).


Scareware - correct answer Malware which tricks users into buying fake antivirus protection


White Hat - correct answer A hacker who does good. Tests security systems with consent of the
owners.

, Black Hat - correct answer A hacker who uses their abilities for malicious purposes such as
breaching and bypassing internet secuirty.


Cyberterrorist - correct answer Someone who uses computers to cause severe damage or
widespread fear in society.


Hacktivist - correct answer a computer hacker whose activity is aimed at promoting a social or
political cause.


Cyberespionage - correct answer the use of computer networks to gain illicit access to
confidential information, typically that held by a government or other organization.


Bots - correct answer Bots can send spam attacks, dos attacks, and others. Malware ran on a
computer can let the attacker place these on computers which once infected are called
zombies.
A collection of bots all controlled by one person is called a botnet, commonly used for DDOS
attacks


Password Cracker - correct answer a program used to guess a users password, using lists of
keywords and common passwords.


Adware - correct answer Malware that displays ads when the user is on the internet, and can
collect marketing data without the user's knowledge. Adware can also redirect a search
request.


Sniffing - correct answer allows individuals to capture data as it is transmitted over a network
and is used by network professionals to diagnose network issues, and by malicious users to
capture unencrypted data, like passwords and usernames.


Script Kiddie - correct answer a person who uses existing computer scripts or code to hack into
computers, lacking the expertise to write their own.

Documentinformatie

Geüpload op
10 november 2025
Aantal pagina's
19
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$15.02
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten

Maak kennis met de verkoper
Seller avatar
simonnjaramba

Ook beschikbaar in voordeelbundel

Thumbnail
Voordeelbundel
CYBER SECURITY REVISED QUESTIONS WITH CERTIFIED ANSWERS
-
16 2025
$ 174.92 Meer info

Maak kennis met de verkoper

Seller avatar
simonnjaramba Teachme2-tutor
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
-
Lid sinds
4 maanden
Aantal volgers
0
Documenten
113
Laatst verkocht
-

0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Populaire documenten

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen