Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

Cyber Security Exams – Complete Question-and-Answer Study Guide (2025/2026)

Beoordeling
-
Verkocht
-
Pagina's
26
Cijfer
A+
Geüpload op
05-12-2025
Geschreven in
2025/2026

This document contains a full collection of cyber security examination questions with detailed, structured answers. It covers core foundational concepts such as cyberspace, cyber security principles, cybercrime types, hacking, spoofing, intrusion detection systems, malware categories, viruses, worms, Trojans, firewalls, DoS attacks, VPN types, digital forensics, spyware, keyloggers, and major network protocols. The content is formatted in a clear Q&A structure suitable for revision, assignments, and final exam preparation.

Meer zien Lees minder
Instelling
Cyber Security
Vak
Cyber security

Voorbeeld van de inhoud

Cyber security study guide 2026
Q.1 What is Cyber Space ?
Ans. The electronic medium of computer networks, in which online communication takes place.
Cyberspace is a domain characterized by the use of electronics and the electromagnetic spectrum
to store, modify, and exchange data via networked systems and associated physical infrastructures.
In effect, cyberspace can be thought of as the interconnection of human beings through computers
and telecommunication, without regard to physical geography.

Q.2 What is Cyber Security ?
Ans Computer security, also known as cybersecurity or IT security, is security applied to
computers, computer networks, and the data stored and transmitted over them.
Cybersecurity is the collection of tools, policies, security concepts, security safeguards, guidelines,
risk management approaches, actions, training, best practices, assurance and technologies that can
be used to protect the cyber environment and organization and user’s assets. Organization and
user’s assets include connected computing devices, personnel, infrastructure, applications,
services, telecommunications systems, and the totality of transmitted and/or stored information in
the cyber environment. Cybersecurity strives to ensure the attainment and maintenance of the
security properties of the organization and user’s assets against relevant security risks in the cyber
environment. The general security objectives comprise the following:
1. Availability
2. Integrity, which may include authenticity and non-repudiation
3. Confidentiality

Q 3. What is Cyber Crimes ?

Ans. “cyber crime” means any criminal or other offence that is facilitated by or involves the use
of electronic communications or information systems, including any device or the Internet or any
one or more of them
Cybercrime is criminal activity done using computers and the Internet. This includes anything
from downloading illegal music files to stealing millions of dollars from online bank accounts.
Cybercrime also includes non-monetary offenses, such as creating and distributing viruses on
other computers or posting confidential business information on the Internet.
Perhaps the most prominent form of cybercrime is identity theft, in which criminals use the Internet
to steal personal information from other users. Two of the most common ways this is done is
through phishing and pharming. Both of these methods lure users to fake websites (that appear to
be legitimate), where they are asked to enter personal information. This includes login information,
such as usernames and passwords, phone numbers, addresses, credit card numbers, bank account

,numbers, and other information criminals can use to "steal" another person's identity. For this
reason, it is smart to always check the URL or Web address of a site to make sure it is legitimate
before entering your personal information.
Because cybercrime covers such a broad scope of criminal activity, the examples above are only
a few of the thousands of crimes that are considered cybercrimes. While computers and the Internet
have made our lives easier in many ways, it is unfortunate that people also use these technologies
to take advantage of others. Therefore, it is smart to protect yourself by using antivirus and spyware
blocking software and being careful where you enter your personal information.




Q. 4 What is type of Cyber Crimes ?

Ans Hacking: This is a type of crime wherein a person’s computer is broken into so that his
personal or sensitive information can be accessed. In the United States, hacking is classified as a
felony and punishable as such. This is different from ethical hacking, which many organizations
use to check their Internet security protection. In hacking, the criminal uses a variety of software
to enter a person’s computer and the person may not be aware that his computer is being accessed
from a remote location.

Theft: This crime occurs when a person violates copyrights and downloads music, movies, games
and software. There are even peer sharing websites which encourage software piracy and many of
these websites are now being targeted by the FBI. Today, the justice system is addressing this
cyber crime and there are laws that prevent people from illegal downloading.

Cyber Stalking: This is a kind of online harassment wherein the victim is subjected to a barrage
of online messages and emails. Typically, these stalkers know their victims and instead of resorting
to offline stalking, they use the Internet to stalk. However, if they notice that cyber stalking is not
having the desired effect, they begin offline stalking along with cyber stalking to make the victims’
lives more miserable.

Identity Theft: This has become a major problem with people using the Internet for cash
transactions and banking services. In this cyber crime, a criminal accesses data about a person’s
bank account, credit cards, Social Security, debit card and other sensitive information to siphon
money or to buy things online in the victim’s name. It can result in major financial losses for the
victim and even spoil the victim’s credit history.

, Malicious Software: These are Internet-based software or programs that are used to disrupt a
network. The software is used to gain access to a system to steal sensitive information or data or
causing damage to software present in the system.

Computer-based fraud. Fraud is different from theft because the victim voluntarily and
knowingly gives the money or property to the criminal but would not have if the criminal did not
misrepresent themselves or their offering. Fraud is a lie. If someone leads you on or allows you to
believe something that is false to benefit them, they are lying and this is fraud. You become a
victim when you voluntarily surrender monies or property based on their misrepresentation or lie.
Losing money from computer crime can be especially devastating because often it is very difficult
to get the money back. Other than direct scams, fraud can include acts such as altering data to get
a benefit; examples are removing arrest records from a police station server, changing grades on a
school computer system, or deleting speeding tickets from driving records.
Online gambling. Gambling over the internet is a violation of American law because the gambling
service providers require electronic payment for gambling through the use of credit cards, debit
cards, electronic fund transfers which is illegal under recent US legislation.


Q. 5 what is Hacking?
Ans
➢ The Process of attempting to gain or successfully gaining, unauthorized access to
computer resources is called Hacking.
➢ Stealing of data and information from someone else’s computer or
Network without the prior permission of the owner.
➢ the act of gaining unauthorized access to computer systems for the
Purpose of stealing and corrupting data.
➢ Computer Hacking is the practice of modifying computer hardware and
Software to accomplish a goal outside of the creator’s original purpose.
➢ the act of gaining access without legal authorization to a computer or
Computer network.

Geschreven voor

Instelling
Cyber security
Vak
Cyber security

Documentinformatie

Geüpload op
5 december 2025
Aantal pagina's
26
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$18.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Puresilver4 stuvia
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
109
Lid sinds
1 jaar
Aantal volgers
1
Documenten
1597
Laatst verkocht
1 dag geleden
PASS SILVER

EXAMS practice with verified and correct answers pass grade A+ SILVER PASSI have Accounting, Finance, Statistics, Computer Science, Nursing, Chemistry, Biology And All Other Subjects A+ solutions A+ SOLUTIONS FOR FELLOW STUDENTS Nursing Being my main profession line, My mission is to be your LIGHT in the dark. If you're worried or having trouble in nursing school, I really want my notes to be your guide! I know they have helped countless others get through and that's all I want for YOU! I have essential Study guides that are Almost A+ graded, I am a very friendly person: Solutions SolutionsStuvia

Lees meer Lees minder
3.9

19 beoordelingen

5
9
4
1
3
8
2
1
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen