Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

Cybersecurity Fundamentals- 2026/2027 Prep Pack

Beoordeling
-
Verkocht
-
Pagina's
27
Cijfer
A+
Geüpload op
20-05-2026
Geschreven in
2025/2026

1. Which security model, becoming the global standard in 2026, assumes that no entity inside or outside the network should be trusted by default? A) Perimeter-Based Security B) Zero Trust Architecture (ZTA) C) Trust-but-Verify Model D) Open Network Policy Correct Answer: B) Zero Trust Architecture (ZTA) 2. What is the primary purpose of "Multi-Factor Authentication" (MFA) in 2027 security protocols? A) To make logging in faster B) To provide multiple layers of defense by requiring two or more forms of verification C) To allow multiple users to use the same password D) To encrypt the user's hard drive Correct Answer: B) To provide multiple layers of defense by requiring two or more forms of verification 3. In 2026, are called: "Phishing" attacks that use AI-generated voice or video to mimic executives A) Smishing B) Vishing and Deepfake Social Engineering C) Spamming D) SQL Injection Correct Answer: B) Vishing and Deepfake Social Engineering 4. What does the "CIA Triad" in cybersecurity stand for? A) Central Intelligence Agency B) Confidentiality, Integrity, and Availability C) Control, Identification, and Access D) Cloud, Internet, and Applications Correct Answer: B) Confidentiality, Integrity, and Availability 5. Which type of malware encrypts a victim's files and demands payment for the decryption key? A) Spyware B) Ransomware C) Adware ) Rootkit Correct Answer: B) Ransomware 6. What is "Social Engineering"? A) Building a social media profile for a company B) Manipulating people into giving up confidential information C) Improving the speed of a team's communication D) Designing a network for social events Correct Answer: B) Manipulating people into giving up confidential information 7. In 2027, "Post-Quantum Cryptography" (PQC) is developed to protect data against: A) Very fast classical computers B) Future quantum computers capable of breaking current encryption C) Power outages D) Simple password guessing Correct Answer: B) Future quantum computers capable of breaking current encryption 8. What is a "Zero-Day Vulnerability"? A) A bug that was fixed zero days ago B) A software flaw that is unknown to the vendor and has no available patch C) A password that expires in zero days D) A network with zero users Correct Answer: B) A software flaw that is unknown to the vendor and has no available patch 9. "Least Privilege" is a principle that suggests: A) Giving everyone administrative rights B) Users should be granted only the minimum levels of access necessary to perform their jobs C) Using the cheapest security software D) Having as few passwords as possible Correct Answer: B) Users should be granted only the minimum levels of access necessary to perform their jobs

Meer zien Lees minder
Instelling
CyberSecurity Certified
Vak
CyberSecurity Certified

Voorbeeld van de inhoud

Cybersecurity Fundamentals: 2026/2027
Prep Pack
Independent Study Guide & Practice Exam

1. Which security model, becoming the global standard in 2026, assumes that no entity
inside or outside the network should be trusted by default?

A) Perimeter-Based Security

B) Zero Trust Architecture (ZTA)

C) Trust-but-Verify Model

D) Open Network Policy

Correct Answer: B) Zero Trust Architecture (ZTA)



2. What is the primary purpose of "Multi-Factor Authentication" (MFA) in 2027 security
protocols?

A) To make logging in faster

B) To provide multiple layers of defense by requiring two or more forms of verification

C) To allow multiple users to use the same password

D) To encrypt the user's hard drive

Correct Answer: B) To provide multiple layers of defense by requiring two or more forms
of verification



3. In 2026, "Phishing" attacks that use AI-generated voice or video to mimic executives
are called:

A) Smishing

B) Vishing and Deepfake Social Engineering

C) Spamming

D) SQL Injection

Correct Answer: B) Vishing and Deepfake Social Engineering

,4. What does the "CIA Triad" in cybersecurity stand for?

A) Central Intelligence Agency

B) Confidentiality, Integrity, and Availability

C) Control, Identification, and Access

D) Cloud, Internet, and Applications

Correct Answer: B) Confidentiality, Integrity, and Availability



5. Which type of malware encrypts a victim's files and demands payment for the
decryption key?

A) Spyware

B) Ransomware

C) Adware

) Rootkit

Correct Answer: B) Ransomware



6. What is "Social Engineering"?

A) Building a social media profile for a company

B) Manipulating people into giving up confidential information

C) Improving the speed of a team's communication

D) Designing a network for social events

Correct Answer: B) Manipulating people into giving up confidential information



7. In 2027, "Post-Quantum Cryptography" (PQC) is developed to protect data against:

A) Very fast classical computers

B) Future quantum computers capable of breaking current encryption

C) Power outages

D) Simple password guessing

Correct Answer: B) Future quantum computers capable of breaking current encryption

, 8. What is a "Zero-Day Vulnerability"?

A) A bug that was fixed zero days ago

B) A software flaw that is unknown to the vendor and has no available patch

C) A password that expires in zero days

D) A network with zero users

Correct Answer: B) A software flaw that is unknown to the vendor and has no available
patch



9. "Least Privilege" is a principle that suggests:

A) Giving everyone administrative rights

B) Users should be granted only the minimum levels of access necessary to perform their jobs

C) Using the cheapest security software

D) Having as few passwords as possible

Correct Answer: B) Users should be granted only the minimum levels of access necessary
to perform their jobs



10. What is the main goal of a "DDoS Attack"?

A) To steal credit card numbers

B) To overwhelm a service or website with traffic until it becomes unavailable

C) To change the content of a database

D) To read private emails

Correct Answer: B) To overwhelm a service or website with traffic until it becomes
unavailable



11. Which 2026 technology uses AI to detect and respond to threats in real-time across
the entire network?

A) Antivirus 1.0

B) Extended Detection and Response (XDR)

C) Manual Firewall

Geschreven voor

Instelling
CyberSecurity Certified
Vak
CyberSecurity Certified

Documentinformatie

Geüpload op
20 mei 2026
Aantal pagina's
27
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

€12,41
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
gradexam Chamberlain College Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
5139
Lid sinds
3 jaar
Aantal volgers
3391
Documenten
4114
Laatst verkocht
21 uur geleden
Learning is hard, but with us it will be easier. You have made the right choice!

Grade Exam specializes in providing study guides that include exams, tests, past work, and quiz questions. We work on every aspect and take into account your wishes every day!

4,1

693 beoordelingen

5
401
4
126
3
77
2
19
1
70

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen