100% tevredenheidsgarantie Direct beschikbaar na betaling Zowel online als in PDF Je zit nergens aan vast
logo-home
Introduction to Cybersecurity Exam Questions and Answers 2024 €13,86   In winkelwagen

Tentamen (uitwerkingen)

Introduction to Cybersecurity Exam Questions and Answers 2024

 7 keer bekeken  0 keer verkocht
  • Vak
  • Cyber Security
  • Instelling
  • Cyber Security

Introduction to Cybersecurity Exam Questions and Answers 2024 Cybersecurity The ongoing process of protecting systems, networks, programs, data and users from harm. What is considered personal data? Medical, Educational, Employment In the IT world, CIA means Confidentiality, Integ...

[Meer zien]

Voorbeeld 2 van de 10  pagina's

  • 17 september 2024
  • 10
  • 2024/2025
  • Tentamen (uitwerkingen)
  • Vragen en antwoorden
  • Cyber Security
  • Cyber Security
avatar-seller
Introduction to Cybersecurity Exam
Questions and Answers 2024

Cybersecurity - answer the ongoing process of protecting systems, networks, programs,
data and users from harm.

What is considered personal data? - answer Medical, Educational, Employment

In the IT world, CIA means - answer Confidentiality, Integrity, Availability

The Internet of Things (IoT) is a large network of physical objects, connections that lead
to an exponential growth of data, called "Big Data," but isn't WHAT? - answer A
traditional computer network.

Confidentiality - answer Ensures the privacy of data.

What program can be used to verify if data has changed or remained the same? -
answer A Hashing program

If you use the same hashing program for a 10 megabyte file and a 100 megabyte file. -
answer The result will be the same fixed-length.

These individuals commit crimes and do arguably unethical things, but not for personal
gain or to cause damage: - answerGrey Hat Hackers

External cyber threats include organized attackers, hackers, and amateurs, but not
WHAT? - answerEmployees

Individuals that must work within the bounds of local, national, and international laws
are WHAT? - answerOrganized Attackers

Another name for the value returned by a hash function is a: - answerDigest

Two methods to ensure confidentiality: - answerUse complex master passwords.
Restrict access through authentication encryption.

Consequences of a security breach are associated with WHAT? - answerOrganizational
data

An internet-based conflict that involves the penetration of computer systems and
networks of other nations. - answerCyberwarfare

, What is EHR? - answerElectronic Health Records

Organizational data is personnel, intellectual, and financial, but NOT: - answerMedical

Patents, trademarks, product plans and trade secrets are considered: -
answerIntellectual data

Access Control Problem - answerIncorrectly regulating who does what and what they
can do with resources.

Buffer Overflow - answerWhen a malicious application access memory allocated to
other processes..

Non-validated Input - answerData coming into a program with malicious content
designed to force the program to behave in unintended ways.

Race Conditions - answerWhen the output of events depend on ordered or timed
outputs.

Symptoms of malware include an increase in CPU usage, files being modified, unknown
processes being run, but ISN'T: - answerAn increases in random access memory.

Methods of infiltration include Social Engineering, Wi-Fi Password Cracking, Phishing,
but NOT: - answerDenial of Service

Taking down a popular bank website and sending emails to the bank's customers
apologizing for the inconvenience is what type of blended attack? - answerDDoS and
Phishing

Sometimes bundled with other software, this malware automatically delivers
advertisements. - answerAdware

Malware designed to automatically perform action, usually online. - answerBot

MitMo (Man-in-the-mobile—middle) - answerMalware use to take control over a mobile
device.

Ransomware - answerMalware that prevents a user's device from properly operating
until a fee is paid.

Rootkit - answerMalware designed to modify operating systems to allow unauthorized
remote access through a backdoor.

(Can modify user privileges, system files and system forensics and monitoring tools,
which makes them extremely difficult to detect and remove.)

Voordelen van het kopen van samenvattingen bij Stuvia op een rij:

Verzekerd van kwaliteit door reviews

Verzekerd van kwaliteit door reviews

Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!

Snel en makkelijk kopen

Snel en makkelijk kopen

Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.

Focus op de essentie

Focus op de essentie

Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper julianah420. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor €13,86. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 71498 samenvattingen verkocht

Opgericht in 2010, al 14 jaar dé plek om samenvattingen te kopen

Start met verkopen
€13,86
  • (0)
  Kopen