100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4.2 TrustPilot
logo-home
Tentamen (uitwerkingen)

Cyber Security Technical Prep Questions & Answers

Beoordeling
-
Verkocht
-
Pagina's
27
Cijfer
A+
Geüpload op
08-11-2025
Geschreven in
2025/2026

Secure yourself with this ultimate set of techinical questions and answers. This comprehensive digital study guide covers all the essential topics you need to know.

Instelling
Cyber Security Specialist
Vak
Cyber Security Specialist










Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
Cyber Security Specialist
Vak
Cyber Security Specialist

Documentinformatie

Geüpload op
8 november 2025
Bestand laatst geupdate op
8 november 2025
Aantal pagina's
27
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

Cyber Security Technical Questions Q &A


Compiled by Professor Kevin

, Cyber security refers to the protection of internet-
connected systems such as software, hardware,
Define Cyber security? electronic data, etc., from cyber-attacks. In a
computing text, it is referred to as protection
Against unauthorized access.

Cryptography is a method to transform and transmit
confidential data in an encoded way to protect the
What is Cryptography?
information from third parties for whom data is not
Authorized.

Threat: Someone with the potential to cause harm
by damaging or destroying the official data of a
System or organization.
Ex: Phishing attack
Vulnerability: It refers to weaknesses in a system that
What is the difference
makes threat outcomes more possible and even
between Threat,
More dangerous.
Vulnerability and Risk?
Ex: SQL injections, cross-site scripting
Risk: It refers to a combination of threat probability
And impact/loss. In simple terms, it is related to
potential damage or loss when a threat exploits the
Vulnerability.

, Cross-Site Scripting is also known as a client-side
injection attack, which aims at executing malicious
scripts on a victim's web browser by injecting
Malicious code.
What is Cross-Site
The following practices can prevent Cross-Site
Scripting and how it can
Scripting:
Be prevented?
Encoding special characters
Using XSS HTML Filter



Validating user inputs
Using Anti-XSS services/tools

See IA Botnet is a group of internet-connected
devices such as servers, PCs, mobile devices, etc.,
That are affected and controlled by malware.
What is a Botnet? It is used for stealing data, sending spam,
performing distributed denial-of-service attack
(DDoS attack), and more, and also to enable the
User to access the device and its connection. Mage

CIA (confidentiality, integrity, and availability) triad is
a model designed to handle policies for information
Security within an organization.
Confidentiality - A collection of rules that limits
What is a CIA triad? Access to information.
Integrity - It assures the information is trustworthy
And reliable.
Availability - It provides reliable access to data for
Authorized people.

Both hashing and encryption are used to convert
Readable data into an unreadable format. The
What is the difference
significant difference is that encrypted data can be
between hashing and
transformed into original data by decryption,
Encryption?
whereas hashed data cannot be processed back to
The original data.
€8,39
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten

Maak kennis met de verkoper
Seller avatar
Gradestar

Maak kennis met de verkoper

Seller avatar
Gradestar Light Star
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
Nieuw op Stuvia
Lid sinds
1 maand
Aantal volgers
0
Documenten
15
Laatst verkocht
-

0,0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen