logo

Crowdly

Browser

Add to Chrome

CYBER SECURITY 700(2025S1CBS700D)

Looking for CYBER SECURITY 700(2025S1CBS700D) test answers and solutions? Browse our comprehensive collection of verified answers for CYBER SECURITY 700(2025S1CBS700D) at learning.richfield.ac.za.

Get instant access to accurate answers and detailed explanations for your course questions. Our community-driven platform helps students succeed!

4) Identify and explain the five essential components of a disaster recovery plan (DRP).(5 marks)

View this question

3) Differentiate between the term’s vulnerability, threat, and risk. Provide one example for each to support your answer.(5 marks)

View this question

2) Name and explain five types of cyber attackers including examples.(5 marks)

View this question

1) Define the term cybersecurity and explain its primary goals.(5 marks)

View this question

7) Discuss the role of social engineering in cyber-attacks. Provide examples of techniques used and how users can be trained to identify them.(10 marks)

View this question

6) Discuss the importance of regulatory compliance in cybersecurity. Refer to at least two Acts or policies applicable in South Africa.(10 marks)

View this question

5) Explain the CIA Triad in detail. Provide examples of how each component may be compromised during a cyber-attack like the SAA incident.(10 marks)

View this question

10) Critically discuss the legal, ethical and business implications of the SAA attack.

Focus your response on:

•The Protection of Personal Information Act (POPIA)

•Ethics of data handling

•Customer and stakeholder trust

•National Key Point designation (15 marks)

View this question

9) Assume you are the cybersecurity consultant brought in post-incident.

Recommend a comprehensive cybersecurity strategy for SAA that addresses:

• Risk assessment

• Cyber hygiene and awareness

• Network security enhancements

• Incident response improvements

• Regulatory compliance (15 marks)

View this question

8) Using the SAA case, analyze the key steps taken by the organization after detecting the attack.

In your answer, refer to:

• The disaster recovery process

• Business continuity measures

• Incident response protocols

• The role of digital forensic investigators  (20 marks)

View this question

Want instant access to all verified answers on learning.richfield.ac.za?

Get Unlimited Answers To Exam Questions - Install Crowdly Extension Now!

Browser

Add to Chrome