100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

100 Common Cybersecurity Questions and Answers – Comprehensive Study and Revision Material

Rating
-
Sold
-
Pages
18
Grade
A+
Uploaded on
05-12-2025
Written in
2025/2026

This document provides a curated collection of 100 of the most common cybersecurity questions paired with clear and accurate answers. It covers essential topics such as network security, malware types, cryptography, access control, incident response, risk management, cloud security, and authentication methods. The content is structured to support exam preparation, professional upskilling, and foundational cybersecurity learning.

Show more Read less
Institution
100 Common Cybersecurity
Module
100 Common Cybersecurity










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
100 Common Cybersecurity
Module
100 Common Cybersecurity

Document information

Uploaded on
December 5, 2025
Number of pages
18
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

100 Common Cybersecurity Questions
and Answers
This resource covers fundamental concepts, network security,
application security, and governance, risk, and compliance (GRC).

Section 1: Fundamentals and Basics (Questions 1-25)
NBR Question Answer
The CIA Triad stands for
Confidentiality, Integrity, and
What is the CIA Triad,
Availability. It is foundational because
and why is it
1 these three principles represent the core
foundational to
goals of any information security
cybersecurity?
system—protecting the state of data and
systems.
Confidentiality: Preventing
unauthorized disclosure of data.
Integrity: Ensuring data is accurate,
Define Confidentiality,
complete, and protected from
2 Integrity, and
unauthorized modification.
Availability (CIA).
Availability: Guaranteeing authorized
users have timely and uninterrupted
access to resources.
A weakness in a system's design,
implementation, or operation and
3 What is a vulnerability?
management that could be exploited to
violate the system's security policy.
A potential danger that might exploit a
vulnerability to breach security and
4 What is a threat? compromise data or systems. (e.g., a
malware attack, a disgruntled
employee).

, The likelihood of a threat exploiting a
What is a risk in the vulnerability, combined with the
5
context of security? resulting negative impact. Risk = Threat
x Vulnerability x Impact.
A Threat Actor is the person or entity
(e.g., hacker, state-sponsored group)
Explain the difference responsible for the attack. A Threat
6 between a threat actor Vector is the path or method used to
and a threat vector. deliver the attack (e.g., a malicious
email attachment, a vulnerable web
server port).
The process of converting plain text
into ciphertext to hide its meaning. The
What is encryption, and
two main types are Symmetric (using
7 what are its two main
one key for both encryption and
types?
decryption) and Asymmetric (using a
pair of public and private keys).
Symmetric (e.g., AES) is fast and uses
the same secret key for both parties.
Differentiate between Asymmetric (e.g., RSA) is slower, uses
8 symmetric and different keys (public for encrypting,
asymmetric encryption. private for decrypting), and is used for
secure key exchange and digital
signatures.
A mathematical algorithm that converts
input data into a fixed-size string of
characters (a hash value or digest). It is
What is a hash function,
9 one-way because it is computationally
and why is it one-way?
infeasible to reverse the process and
derive the original input data from the
hash.
Define Multi-Factor A security measure requiring a user to
10 Authentication (MFA) provide two or more verification factors
and list common factors. to gain access. Factors include:

, Knowledge (something you know, like
a password), Possession (something
you have, like a phone/token), and
Inherence (something you are, like a
fingerprint).
The psychological manipulation of
people into performing actions or
What is Social divulging confidential information.
11 Engineering? Give three Examples: Phishing, Pretexting
examples. (creating a fake scenario), and
Tailgating (following someone into a
restricted area).
A security concept that requires a user
or process to be granted only the
What is the principle of
12 minimum necessary authorization rights
Least Privilege?
and permissions needed to perform its
job or function.
A strategy that uses multiple layers of
security controls (physical, technical,
Explain Defense in administrative) to protect assets. If one
13
Depth. layer fails, another layer will stop the
threat, minimizing the risk of a single
point of failure.
A software flaw that is unknown to the
What is a zero-day software vendor (and for which no
14
vulnerability? official patch exists) but is actively
being exploited by attackers.
A centralized system that aggregates,
What is the role of a analyzes, and correlates log and event
Security Information data from various security devices and
15
and Event Management applications across an organization to
(SIEM) system? detect, alert on, and investigate potential
security incidents in real-time.

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Puresilver4 stuvia
Follow You need to be logged in order to follow users or courses
Sold
72
Member since
1 year
Number of followers
1
Documents
1417
Last sold
14 hours ago
PASS SILVER

EXAMS practice with verified and correct answers pass grade A+ SILVER PASSI have Accounting, Finance, Statistics, Computer Science, Nursing, Chemistry, Biology And All Other Subjects A+ solutions A+ SOLUTIONS FOR FELLOW STUDENTS Nursing Being my main profession line, My mission is to be your LIGHT in the dark. If you're worried or having trouble in nursing school, I really want my notes to be your guide! I know they have helped countless others get through and that's all I want for YOU! I have essential Study guides that are Almost A+ graded, I am a very friendly person: Solutions SolutionsStuvia

Read more Read less
4.1

13 reviews

5
7
4
0
3
6
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their exams and reviewed by others who've used these revision notes.

Didn't get what you expected? Choose another document

No problem! You can straightaway pick a different document that better suits what you're after.

Pay as you like, start learning straight away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and smashed it. It really can be that simple.”

Alisha Student

Frequently asked questions