Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CYBER SECURITY FINAL EXAM QUESTIONS AND ANSWERS -1.

Beoordeling
-
Verkocht
-
Pagina's
13
Cijfer
A+
Geüpload op
01-11-2025
Geschreven in
2025/2026

CYBER SECURITY FINAL EXAM QUESTIONS AND ANSWERS -1.

Instelling
CFI FMVA
Vak
CFI FMVA

Voorbeeld van de inhoud

CYBER SECURITY FINAL EXAM QUESTIONS AND ANSWERS #1

Vulnerability - correct answer a weakness that could be exploited to cause harm

Threat - correct answer a set of circumstances that could cause harm.

Asset - correct answer Things of value you want to protect. such as hardware, software,
and data

Control - correct answer an action, device, procedure, or technique that removes or
reduces a vulnerability

Countermeasure - correct answer a means to counter threats by preventing, deterring,
deflecting, mitigating, detecting, or recovering.

another word for control.

CIA - correct answer confidentiality, integrity, availability.

Interception - correct answer someone intercepts your data. sees it. breach of
confidentiality

Modification - correct answer someone or something modifies data. failure in integrity

fabrication - correct answer someone or something fabricates data. Failure in integrity

interruption - correct answer someone or something interrupts a flow of data or access
to a computer. Failure of availability

four acts of the nature of the harm caused to assets.
(4 types of harm) - correct answer Interception, Modification, fabrication, interruption

Targeted - correct answer directed attack: attacker intends harm to specific computers,
perhaps at one organization (think of attacks against a political organization) or
belonging to a specific individual (think of trying to drain a specific person's bank
account, for example, by impersonation). Also against a certain product (regardless of
whether random people are using the product)

Random - correct answer attacker wants to harm any computer or user; such an attack
is analogous to accosting the next pedestrian who walks down the street. An example of
a random attack is malicious code posted on a website that could be visited by
anybody.

malicious - correct answer human caused. person actually wants to cause harm, and so
we often use the term attack for a malicious computer security event.

, non-malicious - correct answer human caused. unintentional, harm. can be big or small

APT (Advanced Persistent Threat) - correct answer come from organized, well financed,
patient assailants. Often affiliated with governments. Long term campaigns. carefully
select their targets, crafting attacks that appeal to specifically those targets. Silent
hidden attacks, not opportunistic by nature

Harm - correct answer The negative consequence of an actualized threat. The results of
bad stuff.

Risk Management - correct answer choosing which threats to control and what
resources to devote to protection. weighing the seriousness of a threat against our
ability to protect because resources are limited.

Method - correct answer the how of the attack. the skills, knowledge, tools, and other
things with which to perpetrate the attack.

Opportunity - correct answer the when. is the time and access to execute an attack.
Like a person using an unsecured wifi connection

Motive, Method, Opportunity - correct answer All necessary for an attack to succeed.

Motive - correct answer the why of an attack. the reason to want to attack

Defense in Depth (overlapping controls) - correct answer more than one control or more
than one class of control to achieve protection.

Physical Controls - correct answer stop or block an attack by using something tangible
too, such as walls and fences

Procedural (administrative) controls - correct answer controls that use a command or
agreement that requires or advises people how to act such as laws or guidelines

Technical controls - correct answer counter threats with technology (hardware or
software), including passwords, encryption, etc.

Access control - correct answer limiting who can access what in what ways, a
mechanical process

least privilege - correct answer a subject should have access to the smallest number of
objects necessary to perform some task. part of effective policy implementation

granularity - correct answer the fineness or specificity of access control. whether you
are controlling access to the bit or to the entire computer. specificity of access control.
smaller the granularity the more decisions to be made

Geschreven voor

Instelling
CFI FMVA
Vak
CFI FMVA

Documentinformatie

Geüpload op
1 november 2025
Aantal pagina's
13
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$17.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
YOURVERIFIEDEXAMPLUG Havard School
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
98
Lid sinds
3 jaar
Aantal volgers
44
Documenten
5699
Laatst verkocht
3 weken geleden
YOURVERIFIEDEXAMPLUG DEALING WITH TEST BANKS, STUDY GUIDES, PAST AND NEW EXAM PAPERS .

SOLUTION MANUALS | COMPLETE TEST BANKS AND QUIZ BANKS | STUDY SET EXAMS | STUDY GUIDES | 100% VERIFIED ANSWERS AND SOLUTIONS | ALL GRADED A+ On this page you will find well elaborated Test banks, Quiz banks, Solution manuals and many more documents, offered by seller YOURVERIFIEDEXAMPLUG. I wish you a great, easy and reliable learning through your course and exams. kindly message me for any inquiries or assistance in your studies and i will be of great help. THANKYOU!!!!!!!!!!!!!!!!!!!!!!!!!!!! for orders and pre-orders, email me :~

Lees meer Lees minder
4.1

15 beoordelingen

5
9
4
1
3
3
2
1
1
1

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen