Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

LATEST CYBERSECURITY (SECURITY+, CISSP) ACTUAL QUESTIONS AND 100% CORRECT ANSWERS WITH LATEST VERSION.

Beoordeling
-
Verkocht
-
Pagina's
31
Cijfer
A+
Geüpload op
10-04-2026
Geschreven in
2025/2026

LATEST CYBERSECURITY (SECURITY+, CISSP) ACTUAL QUESTIONS AND 100% CORRECT ANSWERS WITH LATEST VERSION.

Instelling
CYBERSECURITY
Vak
CYBERSECURITY

Voorbeeld van de inhoud

LATEST CYBERSECURITY (SECURITY+, CISSP) ACTUAL
QUESTIONS AND 100% CORRECT ANSWERS WITH
LATEST VERSION.


1. A security analyst observes that encrypted traffic between two internal systems is
being intercepted and altered without detection. Which attack is MOST likely
occurring?
A. Replay attack
B. Man-in-the-middle attack
C. ARP poisoning
D. DNS tunneling
Correct Answer: B
Explanation: A man-in-the-middle attack allows interception and modification of
communication between two parties. Replay attacks reuse captured data, ARP
poisoning targets local networks, and DNS tunneling is used for covert data
exfiltration.



2. Which cryptographic algorithm is BEST suited for ensuring data integrity?
A. AES
B. RSA
C. SHA-256
D. Diffie-Hellman
Correct Answer: C
Explanation: SHA-256 is a hashing algorithm used for integrity. AES is for
encryption, RSA for encryption/signatures, and Diffie-Hellman for key exchange.



3. A company wants to implement least privilege access. What is the PRIMARY goal?
A. Increase system performance
B. Limit user access rights to only what is necessary
C. Eliminate authentication mechanisms
D. Provide full administrative access
Correct Answer: B
Explanation: Least privilege ensures users have only the access needed. Other
options either reduce security or are unrelated.



4. Which security model focuses on maintaining confidentiality through classification
levels?
A. Bell-LaPadula
B. Biba
C. Clark-Wilson
D. Brewer-Nash

, Correct Answer: A
Explanation: Bell-LaPadula enforces confidentiality. Biba focuses on integrity, Clark-
Wilson on transactions, Brewer-Nash on conflict of interest.



5. What is the PRIMARY purpose of salting passwords?
A. Encrypt passwords
B. Speed up hashing
C. Prevent rainbow table attacks
D. Compress password storage
Correct Answer: C
Explanation: Salting adds randomness to prevent precomputed hash attacks. It does
not encrypt or compress passwords.



6. Which protocol provides secure remote login over an insecure network?
A. FTP
B. Telnet
C. SSH
D. SNMP
Correct Answer: C
Explanation: SSH encrypts remote sessions. Telnet and FTP are insecure, SNMP is
for management.



7. A zero-day vulnerability refers to:
A. A vulnerability patched immediately
B. A known vulnerability with no exploit
C. An unknown vulnerability with no available fix
D. A vulnerability affecting zero users
Correct Answer: C
Explanation: Zero-day vulnerabilities are unknown to vendors and lack patches,
making them highly dangerous.



8. Which type of malware is designed to appear as legitimate software?
A. Worm
B. Trojan
C. Ransomware
D. Rootkit
Correct Answer: B
Explanation: Trojans disguise themselves as legitimate programs. Worms spread
automatically, ransomware encrypts data, rootkits hide access.

,9. What is the MAIN function of a firewall?
A. Encrypt data
B. Monitor and control network traffic
C. Detect malware signatures
D. Authenticate users
Correct Answer: B
Explanation: Firewalls filter traffic based on rules. Encryption and authentication are
separate functions.



10. Which attack exploits trust relationships between systems?
A. Phishing
B. Spoofing
C. Session hijacking
D. SQL injection
Correct Answer: B
Explanation: Spoofing impersonates trusted entities. Others involve different attack
vectors.



11. Which concept ensures that data is accessible when needed?
A. Confidentiality
B. Integrity
C. Availability
D. Authentication
Correct Answer: C
Explanation: Availability ensures systems/data are accessible. Confidentiality
protects secrecy, integrity ensures accuracy.



12. Which encryption method uses the same key for encryption and decryption?
A. Asymmetric encryption
B. Symmetric encryption
C. Hashing
D. Digital signature
Correct Answer: B
Explanation: Symmetric encryption uses one key. Asymmetric uses two keys.



13. What is the PRIMARY purpose of a digital signature?
A. Encrypt data
B. Ensure confidentiality
C. Verify authenticity and integrity
D. Compress files
Correct Answer: C
Explanation: Digital signatures validate sender identity and data integrity.

, 14. Which attack involves injecting malicious SQL code?
A. XSS
B. CSRF
C. SQL Injection
D. Buffer overflow
Correct Answer: C
Explanation: SQL injection targets databases via malicious queries.



15. What is a risk assessment primarily used for?
A. Eliminating all risks
B. Identifying and evaluating risks
C. Encrypting sensitive data
D. Monitoring user activity
Correct Answer: B
Explanation: Risk assessment identifies and evaluates risks, not eliminates them
completely.



16. Which control type is intended to discourage violations?
A. Detective
B. Preventive
C. Deterrent
D. Corrective
Correct Answer: C
Explanation: Deterrent controls discourage attacks (e.g., warning signs).



17. What is the purpose of multi-factor authentication?
A. Reduce login time
B. Use multiple passwords
C. Increase security by combining factors
D. Eliminate passwords
Correct Answer: C
Explanation: MFA uses multiple factors (something you know, have, are) for stronger
security.



18. Which protocol is used for secure web browsing?
A. HTTP
B. FTP
C. HTTPS
D. SMTP

Geschreven voor

Instelling
CYBERSECURITY
Vak
CYBERSECURITY

Documentinformatie

Geüpload op
10 april 2026
Aantal pagina's
31
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$24.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper
Seller avatar
Excellentdocsolution

Maak kennis met de verkoper

Seller avatar
Excellentdocsolution Stanford University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
6
Lid sinds
1 jaar
Aantal volgers
1
Documenten
2036
Laatst verkocht
1 week geleden
EXELENCE IN EDUCATIOIN

BEST AND AFFORDABLE PRICE

0.0

0 beoordelingen

5
0
4
0
3
0
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen