Cyber security - Study guides, Study notes & Summaries
Looking for the best study guides, study notes and summaries about Cyber security? On this page you'll find 4579 study documents about Cyber security.
Page 4 out of 4.579 results
Sort by
-
Intro To Cyber Security Exam 1 IT (QUESTIONS WITH 100% CORRECT ANSWER Graded A+
- Exam (elaborations) • 28 pages • 2024
- Available in package deal
-
- R259,24
- + learn more
Intro To Cyber Security Exam 1 IT (QUESTIONS WITH 100% CORRECT ANSWER 
virus 
a program that self-replicates, rapid spread, can reduce the functionality and responsiveness of the a network 
 
 
2 ways a virus can spread 
1. scan your computer for connections to a network and then copy itself to other machines on the network to which your computer has access 2. read your email address book and and email itself to everyone in your address book. 
 
 
Macro 
(type of virus) infect the macros in offi...
-
ISC2 Certified In Cyber Security Exam Set Tested Questions With Reviewed Correct Answers | Updated
- Exam (elaborations) • 44 pages • 2024
-
- R326,37
- + learn more
ISC2 Certified In Cyber Security 
Exam Set Tested Questions With 
Reviewed Correct Answers | 
Updated 
What are the 4 (ISC)2 Codes of Ethics? - ANSWER 
and infrastructure (Hacking) 
2. Act honourably, justly and within laws (Lying) 
1. Protect society 
3. Serve principles diligently and competently (Fulfil your duties) 
4. Advance the information security profession (Helping cheat exams) 
What are the 5 confidentiality concerns? (CIA) - ANSWER 
Snooping (gathering information th...
-
Cyber Security Samenvatting cijfer 8.1
- Class notes • 29 pages • 2022
-
- R97,04
- 4x sold
- + learn more
Dit is mijn samenvatting van het vak cybersecurity! Ik vond het erg leuk om te leren daarom dat ik ook veel tijd heb gestopt in het maken van samenvattingen. Ik heb een 8,1 gehaald.
-
Principles of Cyber Security Questions and Answers 100% Accurate
- Exam (elaborations) • 14 pages • 2024
- Available in package deal
-
- R299,16
- + learn more
Principles of Cyber Security Questions and Answers 100% Accurate 
CIA 
Confidentiality, Integrity, Availability 
 
 
 
Confidentiality 
The avoidance of the unauthorized disclosure of information. It involves the protection of data, providing access for those who are allowed to see it while disallowing others from learning anything about its content. This can be achieved with: 
- Encryption 
- Access Control 
- Authentication 
- Authorisation 
- Physical Security 
 
 
 
Integrity 
The property t...
-
The Federal Virtual Training Environment (FedVTE) Complete ALL Quizzes_ 2022/23.
- Other • 69 pages • 2022
-
- R335,44
- 2x sold
- + learn more
FedVTE Cyber Risk Management for Technicians Quiz. 
FedVTE Cyber Risk Management for Technicians Quiz (2) 
FedVTE Cyber Security Investigations Test (answered) 
FedVTE Cyber Security Overview for Managers Test (Answered) 
FedVTE - Windows Operating System Security Quiz_ 2022. 
FedVTE CAP Questions 1-50 (Answered fall 2022) 
FedVTE Enterprise Cybersecurity Operations 
Cybersecurity Analyst Practice Quiz (FedVTE) 2023. 
FedVTE Introduction to Cyber Intelligence 
FedVTE CASP 
FedVTE Cisco CCNA Secu...
Get paid weekly? You can!
-
Cyber Security Knowledge Assessment Latest Update Questions and Answers
- Exam (elaborations) • 16 pages • 2024
-
- R144,95
- + learn more
Cyber Security Knowledge Assessment Latest Update Questions and Answers 
 
1: What is Cyber Security? - correct answer - 
Cyber Security is the practice of protecting systems, networks, and programs from digital attacks aimed at accessing, changing, or destroying sensitive information, extorting money from users, or interrupting normal business processes. 
 
 
2: What is a firewall? - correct answer - 
A firewall is a network security device that monitors and filters incoming and outgoing networ...
-
Cisco Cyber Security Exam |Complete with Questions and + Graded Answers
- Exam (elaborations) • 18 pages • 2024
- Available in package deal
-
- R201,19
- + learn more
Cisco Cyber Security Exam 
It looks like an attacker has targeted a vulnerability in @Apollo's online messaging service, which is used to facilitate communications between employees working across different sites. When an employee makes a voice call, it floods the memory of the application, effectively giving the attacker control over the employee's device. What type of attack is this? 
Buffer overflow 
 
 
An employee received an email that looked like it came from an @Apollo supplier asking ...
-
CISCO (Cyber Security) Study Questions Frequently Tested with Accurate Solutions.
- Exam (elaborations) • 33 pages • 2024
-
- R290,09
- + learn more
CISCO (Cyber Security) Study Questions Frequently Tested with Accurate Solutions.
-
C844 Emerging Technologies in Cyber security Qualys Training Exams passed questions and answers 2024 Western Governors University
- Exam (elaborations) • 21 pages • 2024
-
- R226,59
- + learn more
C844 Emerging Technologies in Cyber security Qualys Training Exams passed questions and answers 2024 Western Governors University
-
Cyber Security Course Questions and Answers Rated A+
- Exam (elaborations) • 11 pages • 2024
- Available in package deal
-
- R335,44
- + learn more
Cyber Security Course Questions and Answers Rated A+ 
Threats are... 
...unwanted actions potentially harming assets. 
 
 
 
Vulnerabilities are... 
...weaknesses in any safeguard for cyber assets. 
 
 
 
The likelihood of a threat is... 
...the possibility that it may arise. 
 
 
 
The consequence of a threat is... 
...the worst-case outcome of a threat. 
 
 
 
According to NIST 800-50, education is... 
...any course/material that provides employees the necessary decision-making and management ...
That summary you just bought made someone very happy. Also get paid weekly? Sell your study documents on Stuvia! Discover all about earning on Stuvia