Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CYB 1 – Introduction to Cybersecurity 3

Beoordeling
-
Verkocht
-
Pagina's
24
Cijfer
A+
Geüpload op
17-03-2025
Geschreven in
2024/2025

CYB 1 – Introduction to Cybersecurity 3

Instelling
Introduction To Cybersecurity
Vak
Introduction to cybersecurity

Voorbeeld van de inhoud

1. Which of the following is the main purpose of "End-to-End Encryption"?

A. To ensure data remains encrypted while being transmitted between two parties

B. To prevent unauthorized users from accessing a website

C. To create backups of data

D. To protect physical hardware from theft

Answer: a) To ensure data remains encrypted while being transmitted between two

parties

Rationale: End-to-end encryption protects data during transmission, ensuring that only

the sender and recipient can read it.




2. Which of the following is an example of "Multi-factor Authentication"?

A. Using a password and answering a security question

B. Using a password and a unique code sent to your phone

C. Using a password and an email verification link

D. Using a password and a fingerprint scan

Answer: b) Using a password and a unique code sent to your phone

Rationale: Multi-factor authentication (MFA) involves using more than one verification

method, such as something you know (password) and something you have (code sent

to a phone).




3. What does the term "Data Breach" refer to?

,A. The unauthorized access, acquisition, or disclosure of sensitive data

B. A network disruption caused by a denial-of-service attack

C. A legitimate access to protected data by an authorized user

D. A software vulnerability that has been patched

Answer: a) The unauthorized access, acquisition, or disclosure of sensitive data

Rationale: A data breach occurs when sensitive data is accessed or stolen by

unauthorized individuals.




4. What does "encryption" do in the context of cybersecurity?

A. Protects the data by making it unreadable to unauthorized users

B. Increases the speed of data transmission

C. Stores data in a cloud-based server

D. Backs up data to prevent loss

Answer: a) Protects the data by making it unreadable to unauthorized users

Rationale: Encryption transforms readable data into a format that cannot be easily

understood by unauthorized users without a decryption key.




5. What is the best practice when creating strong passwords?

A. Use only letters and numbers

B. Use long and complex passwords with a combination of letters, numbers, and

symbols

C. Use a password that is easy to remember

, D. Reuse passwords across multiple accounts for convenience

Answer: b) Use long and complex passwords with a combination of letters, numbers,

and symbols

Rationale: Complex passwords are more difficult for attackers to guess or crack,

enhancing security.




6. What is "Cryptojacking"?

A. A technique for stealing cryptocurrency wallets

B. A method of using infected computers to mine cryptocurrency without user consent

C. A way to store cryptocurrency securely

D. A method of encrypting files for ransom

Answer: b) A method of using infected computers to mine cryptocurrency without user

consent

Rationale: Cryptojacking involves hijacking the processing power of users' devices to

mine cryptocurrency without their consent.




7. Which of the following is a type of malware that spreads by replicating itself?

A. Trojan Horse

B. Virus

C. Spyware

D. Ransomware

Answer: b) Virus

Geschreven voor

Instelling
Introduction to cybersecurity
Vak
Introduction to cybersecurity

Documentinformatie

Geüpload op
17 maart 2025
Aantal pagina's
24
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

€9,80
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kan je een ander document kiezen. Je kan het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
douglasmugwe82
5,0
(1)

Maak kennis met de verkoper

Seller avatar
douglasmugwe82 Teachme2-tutor
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
2
Lid sinds
1 jaar
Aantal volgers
0
Documenten
4239
Laatst verkocht
5 maanden geleden
fully answered questions and answer

fully answered questions and answer

5,0

1 beoordelingen

5
1
4
0
3
0
2
0
1
0

Populaire documenten

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via Bancontact, iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo eenvoudig kan het zijn.”

Alisha Student

Veelgestelde vragen