100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

CYBER SECURITY REVISED QUESTIONS AND ANSWERS-

Rating
-
Sold
-
Pages
7
Grade
A+
Uploaded on
10-11-2025
Written in
2025/2026

CYBER SECURITY REVISED QUESTIONS AND ANSWERS-18 - C










Whoops! We can’t load your doc right now. Try again or contact support.

Document information

Uploaded on
November 10, 2025
Number of pages
7
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

CYBER SECURITY REVISED QUESTIONS AND ANSWERS#18
Access management - correct answer Managing the access to a computer system/network. It
includes procedures such as account administration, account maintenance, account monitoring
and the revocation of an account.


Account lockout - correct answer A software security method performed by operating system
software that locks any account when a user fails a login attempt more than a set number of
times. For example, system software can be set up to lock an account for several hours if the
user fails the login three consecutive times in a set time frame.


Anti-malware - correct answer Software designed to prevent, detect and eradicate malicious
software, such as a virus or a worm


Anomaly based - correct answer Software that is designed to detect computer intrusions and
misuse by monitoring system activity and classifying it as either normal or anomalous.


Asset - correct answer Something that is of value to a person, an organisation or a state, e.g.
Data, finance and secrets that should be secured against cyber security incidents.


Attacker - correct answer Individuals or organisations that target computer systems/networks
illegally.


Audit trail - correct answer A record of activities on a computer system/network, for example, a
record of modifications to data or access to parts of a system/network.


Availability - correct answer Data/information stored on a computer system/network must be
available to authorised users and organisations and be protected from unauthorised deletion.


Biometric access - correct answer Access to a computer system/network using technologies
that measure and analyse human body characteristics for authentication purposes, such as
DNA, fingerprints, retinas, voice patterns, facial patterns and hand measurements.

, Botnet - correct answer A network of computers infected with malicious software and
controlled without the owners' knowledge, for example, to send spam or hoax emails.


Business continuity plan - correct answer A plan to continue operations that an organisation will
follow if it is affected by a cyber security incident


Confidentiality - correct answer Information stored on a computer system/network must be
protected against unintended or unauthorised access. Data confidentiality is a measure of the
ability of a system to protect its data.


Cyber criminal - correct answer An individual who commits illegal activities using computers
and the Internet.


Cyber dependant - correct answer Illegal activities dependent on the use of computers and the
Internet, such as hacking or the distribution of malware on a network.


Cyber enabled - correct answer Illegal activities that could be undertaken without the use of
computers, such as fraud but that are enabled by the use of computers, such as fraudulently
obtaining money for goods online.


Cyber security - correct answer Refers to technologies, processes and practices designed to
protect computers, networks, software and data from attack, damage or unauthorised access
and aims to protect data confidentiality, integrity and availability.


Cyber security incident - correct answer An unwanted/unexpected event, such as an intrusion
into a computer system/network, such as the spread of malware.


Cyber security incident report - correct answer A report that documents the details of a cyber
security incident, such as the type of incident, when it occurred, how it was performed, etc.
$9.75
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached

Get to know the seller
Seller avatar
simonnjaramba

Also available in package deal

Thumbnail
Package deal
CYBER SECURITY REVISED QUESTIONS WITH CERTIFIED ANSWERS
-
16 2025
$ 176.15 More info

Get to know the seller

Seller avatar
simonnjaramba Teachme2-tutor
View profile
Follow You need to be logged in order to follow users or courses
Sold
New on Stuvia
Member since
2 months
Number of followers
0
Documents
113
Last sold
-

0.0

0 reviews

5
0
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions