100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

100 Common Cybersecurity Questions and Answers – Comprehensive Study and Revision Material

Puntuación
-
Vendido
-
Páginas
18
Grado
A+
Subido en
08-12-2025
Escrito en
2025/2026

This document provides a curated collection of 100 of the most common cybersecurity questions paired with clear and accurate answers. It covers essential topics such as network security, malware types, cryptography, access control, incident response, risk management, cloud security, and authentication methods. The content is structured to support exam preparation, professional upskilling, and foundational cybersecurity learning.

Mostrar más Leer menos
Institución
100 Common Cybersecurity
Grado
100 Common Cybersecurity










Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
100 Common Cybersecurity
Grado
100 Common Cybersecurity

Información del documento

Subido en
8 de diciembre de 2025
Número de páginas
18
Escrito en
2025/2026
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

100 Common Cybersecurity Questions
and Answers
This resource covers fundamental concepts, network security,
application security, and governance, risk, and compliance (GRC).

Section 1: Fundamentals and Basics (Questions 1-25)
NBR Question Answer
The CIA Triad stands for
Confidentiality, Integrity, and
What is the CIA Triad,
Availability. It is foundational because
and why is it
1 these three principles represent the core
foundational to
goals of any information security
cybersecurity?
system—protecting the state of data and
systems.
Confidentiality: Preventing
unauthorized disclosure of data.
Integrity: Ensuring data is accurate,
Define Confidentiality,
complete, and protected from
2 Integrity, and
unauthorized modification.
Availability (CIA).
Availability: Guaranteeing authorized
users have timely and uninterrupted
access to resources.
A weakness in a system's design,
implementation, or operation and
3 What is a vulnerability?
management that could be exploited to
violate the system's security policy.
A potential danger that might exploit a
vulnerability to breach security and
4 What is a threat? compromise data or systems. (e.g., a
malware attack, a disgruntled
employee).

, The likelihood of a threat exploiting a
What is a risk in the vulnerability, combined with the
5
context of security? resulting negative impact. Risk = Threat
x Vulnerability x Impact.
A Threat Actor is the person or entity
(e.g., hacker, state-sponsored group)
Explain the difference responsible for the attack. A Threat
6 between a threat actor Vector is the path or method used to
and a threat vector. deliver the attack (e.g., a malicious
email attachment, a vulnerable web
server port).
The process of converting plain text
into ciphertext to hide its meaning. The
What is encryption, and
two main types are Symmetric (using
7 what are its two main
one key for both encryption and
types?
decryption) and Asymmetric (using a
pair of public and private keys).
Symmetric (e.g., AES) is fast and uses
the same secret key for both parties.
Differentiate between Asymmetric (e.g., RSA) is slower, uses
8 symmetric and different keys (public for encrypting,
asymmetric encryption. private for decrypting), and is used for
secure key exchange and digital
signatures.
A mathematical algorithm that converts
input data into a fixed-size string of
characters (a hash value or digest). It is
What is a hash function,
9 one-way because it is computationally
and why is it one-way?
infeasible to reverse the process and
derive the original input data from the
hash.
Define Multi-Factor A security measure requiring a user to
10 Authentication (MFA) provide two or more verification factors
and list common factors. to gain access. Factors include:

, Knowledge (something you know, like
a password), Possession (something
you have, like a phone/token), and
Inherence (something you are, like a
fingerprint).
The psychological manipulation of
people into performing actions or
What is Social divulging confidential information.
11 Engineering? Give three Examples: Phishing, Pretexting
examples. (creating a fake scenario), and
Tailgating (following someone into a
restricted area).
A security concept that requires a user
or process to be granted only the
What is the principle of
12 minimum necessary authorization rights
Least Privilege?
and permissions needed to perform its
job or function.
A strategy that uses multiple layers of
security controls (physical, technical,
Explain Defense in administrative) to protect assets. If one
13
Depth. layer fails, another layer will stop the
threat, minimizing the risk of a single
point of failure.
A software flaw that is unknown to the
What is a zero-day software vendor (and for which no
14
vulnerability? official patch exists) but is actively
being exploited by attackers.
A centralized system that aggregates,
What is the role of a analyzes, and correlates log and event
Security Information data from various security devices and
15
and Event Management applications across an organization to
(SIEM) system? detect, alert on, and investigate potential
security incidents in real-time.
$18.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
Nursepasspro stuvia
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
15
Miembro desde
6 meses
Número de seguidores
1
Documentos
998
Última venta
9 horas hace

4.3

3 reseñas

5
2
4
0
3
1
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes