100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

100 Common Cybersecurity Questions and Answers – Comprehensive Study and Revision Material

Beoordeling
-
Verkocht
-
Pagina's
18
Cijfer
A+
Geüpload op
05-12-2025
Geschreven in
2025/2026

This document provides a curated collection of 100 of the most common cybersecurity questions paired with clear and accurate answers. It covers essential topics such as network security, malware types, cryptography, access control, incident response, risk management, cloud security, and authentication methods. The content is structured to support exam preparation, professional upskilling, and foundational cybersecurity learning.

Meer zien Lees minder
Instelling
100 Common Cybersecurity
Vak
100 Common Cybersecurity










Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
100 Common Cybersecurity
Vak
100 Common Cybersecurity

Documentinformatie

Geüpload op
5 december 2025
Aantal pagina's
18
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

100 Common Cybersecurity Questions
and Answers
This resource covers fundamental concepts, network security,
application security, and governance, risk, and compliance (GRC).

Section 1: Fundamentals and Basics (Questions 1-25)
NBR Question Answer
The CIA Triad stands for
Confidentiality, Integrity, and
What is the CIA Triad,
Availability. It is foundational because
and why is it
1 these three principles represent the core
foundational to
goals of any information security
cybersecurity?
system—protecting the state of data and
systems.
Confidentiality: Preventing
unauthorized disclosure of data.
Integrity: Ensuring data is accurate,
Define Confidentiality,
complete, and protected from
2 Integrity, and
unauthorized modification.
Availability (CIA).
Availability: Guaranteeing authorized
users have timely and uninterrupted
access to resources.
A weakness in a system's design,
implementation, or operation and
3 What is a vulnerability?
management that could be exploited to
violate the system's security policy.
A potential danger that might exploit a
vulnerability to breach security and
4 What is a threat? compromise data or systems. (e.g., a
malware attack, a disgruntled
employee).

, The likelihood of a threat exploiting a
What is a risk in the vulnerability, combined with the
5
context of security? resulting negative impact. Risk = Threat
x Vulnerability x Impact.
A Threat Actor is the person or entity
(e.g., hacker, state-sponsored group)
Explain the difference responsible for the attack. A Threat
6 between a threat actor Vector is the path or method used to
and a threat vector. deliver the attack (e.g., a malicious
email attachment, a vulnerable web
server port).
The process of converting plain text
into ciphertext to hide its meaning. The
What is encryption, and
two main types are Symmetric (using
7 what are its two main
one key for both encryption and
types?
decryption) and Asymmetric (using a
pair of public and private keys).
Symmetric (e.g., AES) is fast and uses
the same secret key for both parties.
Differentiate between Asymmetric (e.g., RSA) is slower, uses
8 symmetric and different keys (public for encrypting,
asymmetric encryption. private for decrypting), and is used for
secure key exchange and digital
signatures.
A mathematical algorithm that converts
input data into a fixed-size string of
characters (a hash value or digest). It is
What is a hash function,
9 one-way because it is computationally
and why is it one-way?
infeasible to reverse the process and
derive the original input data from the
hash.
Define Multi-Factor A security measure requiring a user to
10 Authentication (MFA) provide two or more verification factors
and list common factors. to gain access. Factors include:

, Knowledge (something you know, like
a password), Possession (something
you have, like a phone/token), and
Inherence (something you are, like a
fingerprint).
The psychological manipulation of
people into performing actions or
What is Social divulging confidential information.
11 Engineering? Give three Examples: Phishing, Pretexting
examples. (creating a fake scenario), and
Tailgating (following someone into a
restricted area).
A security concept that requires a user
or process to be granted only the
What is the principle of
12 minimum necessary authorization rights
Least Privilege?
and permissions needed to perform its
job or function.
A strategy that uses multiple layers of
security controls (physical, technical,
Explain Defense in administrative) to protect assets. If one
13
Depth. layer fails, another layer will stop the
threat, minimizing the risk of a single
point of failure.
A software flaw that is unknown to the
What is a zero-day software vendor (and for which no
14
vulnerability? official patch exists) but is actively
being exploited by attackers.
A centralized system that aggregates,
What is the role of a analyzes, and correlates log and event
Security Information data from various security devices and
15
and Event Management applications across an organization to
(SIEM) system? detect, alert on, and investigate potential
security incidents in real-time.

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Puresilver4 stuvia
Bekijk profiel
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
72
Lid sinds
1 jaar
Aantal volgers
1
Documenten
1417
Laatst verkocht
13 uur geleden
PASS SILVER

EXAMS practice with verified and correct answers pass grade A+ SILVER PASSI have Accounting, Finance, Statistics, Computer Science, Nursing, Chemistry, Biology And All Other Subjects A+ solutions A+ SOLUTIONS FOR FELLOW STUDENTS Nursing Being my main profession line, My mission is to be your LIGHT in the dark. If you're worried or having trouble in nursing school, I really want my notes to be your guide! I know they have helped countless others get through and that's all I want for YOU! I have essential Study guides that are Almost A+ graded, I am a very friendly person: Solutions SolutionsStuvia

Lees meer Lees minder
4.1

13 beoordelingen

5
7
4
0
3
6
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen