Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

Cybersecurity Fundamentals – Common Security Concepts and Threats (2025) | 100 Practice Questions and Answers

Beoordeling
-
Verkocht
-
Pagina's
15
Cijfer
A+
Geüpload op
21-01-2026
Geschreven in
2025/2026

This document contains 100 commonly asked cybersecurity questions with clear and concise answers, covering core concepts such as network security, malware, cryptography, authentication, risk management, and cyber threats. It is designed as a practical study and revision resource for students and beginners preparing for cybersecurity exams, certifications, or introductory courses.

Meer zien Lees minder
Instelling
100 Common Cybersecurity
Vak
100 Common Cybersecurity

Voorbeeld van de inhoud

100 Common Cybersecurity Questions
and Answers
This resource covers fundamental concepts, network security,
application security, and governance, risk, and compliance (GRC).

Section 1: Fundamentals and Basics (Questions 1-25)
N
B Question Answer
R
The CIA Triad stands for Confidentiality,
What is the CIA
Integrity, and Availability. It is foundational
Triad, and why is it
1 because these three principles represent the core
foundational to
goals of any information security system—
cybersecurity?
protecting the state of data and systems.
Confidentiality: Preventing unauthorized
Define disclosure of data. Integrity: Ensuring data is
Confidentiality, accurate, complete, and protected from
2
Integrity, and unauthorized modification. Availability:
Availability (CIA). Guaranteeing authorized users have timely and
uninterrupted access to resources.
A weakness in a system's design,
What is a implementation, or operation and management
3
vulnerability? that could be exploited to violate the system's
security policy.
A potential danger that might exploit a
vulnerability to breach security and compromise
4 What is a threat?
data or systems. (e.g., a malware attack, a
disgruntled employee).
The likelihood of a threat exploiting a
What is a risk in the vulnerability, combined with the resulting
5
context of security? negative impact. Risk = Threat x Vulnerability x
Impact.

, A Threat Actor is the person or entity (e.g.,
Explain the hacker, state-sponsored group) responsible for
difference between a the attack. A Threat Vector is the path or
6
threat actor and a method used to deliver the attack (e.g., a
threat vector. malicious email attachment, a vulnerable web
server port).
The process of converting plain text into
What is encryption, ciphertext to hide its meaning. The two main
7 and what are its two types are Symmetric (using one key for both
main types? encryption and decryption) and Asymmetric
(using a pair of public and private keys).
Symmetric (e.g., AES) is fast and uses the same
Differentiate between
secret key for both parties. Asymmetric (e.g.,
symmetric and
8 RSA) is slower, uses different keys (public for
asymmetric
encrypting, private for decrypting), and is used
encryption.
for secure key exchange and digital signatures.
A mathematical algorithm that converts input
data into a fixed-size string of characters (a hash
What is a hash
value or digest). It is one-way because it is
9 function, and why is
computationally infeasible to reverse the
it one-way?
process and derive the original input data from
the hash.
A security measure requiring a user to provide
Define Multi-Factor two or more verification factors to gain access.
1 Authentication Factors include: Knowledge (something you
0 (MFA) and list know, like a password), Possession (something
common factors. you have, like a phone/token), and Inherence
(something you are, like a fingerprint).
The psychological manipulation of people into
What is Social performing actions or divulging confidential
1
Engineering? Give information. Examples: Phishing, Pretexting
1
three examples. (creating a fake scenario), and Tailgating
(following someone into a restricted area).

Geschreven voor

Instelling
100 Common Cybersecurity
Vak
100 Common Cybersecurity

Documentinformatie

Geüpload op
21 januari 2026
Aantal pagina's
15
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$17.99
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
Proffscholar4

Maak kennis met de verkoper

Seller avatar
Proffscholar4 stuvia
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
-
Lid sinds
1 jaar
Aantal volgers
0
Documenten
111
Laatst verkocht
-

0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen