Written by students who passed Immediately available after payment Read online or as PDF Wrong document? Swap it for free 4.6 TrustPilot
logo-home
Exam (elaborations)

Cybersecurity Fundamentals- 2026/2027 Prep Pack

Rating
-
Sold
-
Pages
27
Grade
A+
Uploaded on
20-05-2026
Written in
2025/2026

1. Which security model, becoming the global standard in 2026, assumes that no entity inside or outside the network should be trusted by default? A) Perimeter-Based Security B) Zero Trust Architecture (ZTA) C) Trust-but-Verify Model D) Open Network Policy Correct Answer: B) Zero Trust Architecture (ZTA) 2. What is the primary purpose of "Multi-Factor Authentication" (MFA) in 2027 security protocols? A) To make logging in faster B) To provide multiple layers of defense by requiring two or more forms of verification C) To allow multiple users to use the same password D) To encrypt the user's hard drive Correct Answer: B) To provide multiple layers of defense by requiring two or more forms of verification 3. In 2026, are called: "Phishing" attacks that use AI-generated voice or video to mimic executives A) Smishing B) Vishing and Deepfake Social Engineering C) Spamming D) SQL Injection Correct Answer: B) Vishing and Deepfake Social Engineering 4. What does the "CIA Triad" in cybersecurity stand for? A) Central Intelligence Agency B) Confidentiality, Integrity, and Availability C) Control, Identification, and Access D) Cloud, Internet, and Applications Correct Answer: B) Confidentiality, Integrity, and Availability 5. Which type of malware encrypts a victim's files and demands payment for the decryption key? A) Spyware B) Ransomware C) Adware ) Rootkit Correct Answer: B) Ransomware 6. What is "Social Engineering"? A) Building a social media profile for a company B) Manipulating people into giving up confidential information C) Improving the speed of a team's communication D) Designing a network for social events Correct Answer: B) Manipulating people into giving up confidential information 7. In 2027, "Post-Quantum Cryptography" (PQC) is developed to protect data against: A) Very fast classical computers B) Future quantum computers capable of breaking current encryption C) Power outages D) Simple password guessing Correct Answer: B) Future quantum computers capable of breaking current encryption 8. What is a "Zero-Day Vulnerability"? A) A bug that was fixed zero days ago B) A software flaw that is unknown to the vendor and has no available patch C) A password that expires in zero days D) A network with zero users Correct Answer: B) A software flaw that is unknown to the vendor and has no available patch 9. "Least Privilege" is a principle that suggests: A) Giving everyone administrative rights B) Users should be granted only the minimum levels of access necessary to perform their jobs C) Using the cheapest security software D) Having as few passwords as possible Correct Answer: B) Users should be granted only the minimum levels of access necessary to perform their jobs

Show more Read less
Institution
CyberSecurity Certified
Course
CyberSecurity Certified

Content preview

Cybersecurity Fundamentals: 2026/2027
Prep Pack
Independent Study Guide & Practice Exam

1. Which security model, becoming the global standard in 2026, assumes that no entity
inside or outside the network should be trusted by default?

A) Perimeter-Based Security

B) Zero Trust Architecture (ZTA)

C) Trust-but-Verify Model

D) Open Network Policy

Correct Answer: B) Zero Trust Architecture (ZTA)



2. What is the primary purpose of "Multi-Factor Authentication" (MFA) in 2027 security
protocols?

A) To make logging in faster

B) To provide multiple layers of defense by requiring two or more forms of verification

C) To allow multiple users to use the same password

D) To encrypt the user's hard drive

Correct Answer: B) To provide multiple layers of defense by requiring two or more forms
of verification



3. In 2026, "Phishing" attacks that use AI-generated voice or video to mimic executives
are called:

A) Smishing

B) Vishing and Deepfake Social Engineering

C) Spamming

D) SQL Injection

Correct Answer: B) Vishing and Deepfake Social Engineering

,4. What does the "CIA Triad" in cybersecurity stand for?

A) Central Intelligence Agency

B) Confidentiality, Integrity, and Availability

C) Control, Identification, and Access

D) Cloud, Internet, and Applications

Correct Answer: B) Confidentiality, Integrity, and Availability



5. Which type of malware encrypts a victim's files and demands payment for the
decryption key?

A) Spyware

B) Ransomware

C) Adware

) Rootkit

Correct Answer: B) Ransomware



6. What is "Social Engineering"?

A) Building a social media profile for a company

B) Manipulating people into giving up confidential information

C) Improving the speed of a team's communication

D) Designing a network for social events

Correct Answer: B) Manipulating people into giving up confidential information



7. In 2027, "Post-Quantum Cryptography" (PQC) is developed to protect data against:

A) Very fast classical computers

B) Future quantum computers capable of breaking current encryption

C) Power outages

D) Simple password guessing

Correct Answer: B) Future quantum computers capable of breaking current encryption

, 8. What is a "Zero-Day Vulnerability"?

A) A bug that was fixed zero days ago

B) A software flaw that is unknown to the vendor and has no available patch

C) A password that expires in zero days

D) A network with zero users

Correct Answer: B) A software flaw that is unknown to the vendor and has no available
patch



9. "Least Privilege" is a principle that suggests:

A) Giving everyone administrative rights

B) Users should be granted only the minimum levels of access necessary to perform their jobs

C) Using the cheapest security software

D) Having as few passwords as possible

Correct Answer: B) Users should be granted only the minimum levels of access necessary
to perform their jobs



10. What is the main goal of a "DDoS Attack"?

A) To steal credit card numbers

B) To overwhelm a service or website with traffic until it becomes unavailable

C) To change the content of a database

D) To read private emails

Correct Answer: B) To overwhelm a service or website with traffic until it becomes
unavailable



11. Which 2026 technology uses AI to detect and respond to threats in real-time across
the entire network?

A) Antivirus 1.0

B) Extended Detection and Response (XDR)

C) Manual Firewall

Written for

Institution
CyberSecurity Certified
Course
CyberSecurity Certified

Document information

Uploaded on
May 20, 2026
Number of pages
27
Written in
2025/2026
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

$13.99
Get access to the full document:

Wrong document? Swap it for free Within 14 days of purchase and before downloading, you can choose a different document. You can simply spend the amount again.
Written by students who passed
Immediately available after payment
Read online or as PDF

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
gradexam Chamberlain College Nursing
Follow You need to be logged in order to follow users or courses
Sold
5139
Member since
3 year
Number of followers
3391
Documents
4114
Last sold
19 hours ago
Learning is hard, but with us it will be easier. You have made the right choice!

Grade Exam specializes in providing study guides that include exams, tests, past work, and quiz questions. We work on every aspect and take into account your wishes every day!

4.1

693 reviews

5
401
4
126
3
77
2
19
1
70

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Working on your references?

Create accurate citations in APA, MLA and Harvard with our free citation generator.

Working on your references?

Frequently asked questions