Data Loading...

Chapter 2 Quiz Attempt review Flipbook PDF

Chapter 2 Quiz Attempt review


114 Views
51 Downloads
FLIP PDF 273.13KB

DOWNLOAD FLIP

REPORT DMCA

&

%

Home / I'm Learning / ‫من السيبرانى‬+‫مبادرة تعلم اساسيات ا‬ / Chapter 2: The Cybersecurity Cube / Chapter 2 Quiz

!

"

Course Home

#

Grades

Messages

$

Calendar

‫من‬+‫مبادرة تعلم اساسيات ا‬ ‫السيبرانى‬ Started on Sunday, 26 December 2021, 9:05 PM State

Finished

Completed on Sunday, 26 December 2021, 9:06 PM Time taken 51 secs Marks

6.00/40.00

Grade

15.00 out of 100.00

Question 1 Incorrect Mark 0.00 out of 2.00 Flag question

Which two methods help to ensure data integrity? (Choose two.) Select one or more:

!

' availability repudiation hashing authorization privacy data consistency checks Refer to curriculum topic: 2.2.2 Data integrity systems include one of the two data integrity methods. The correct answers are: hashing, data consistency checks

Question 2 Incorrect Mark 0.00 out of 2.00 Flag question

For the purpose of authentication, what three methods are used to verify identity? (Choose three.) Select one or more:

!

' something you do where you are something you have something you are something you know Refer to curriculum topic: 2.2.1 The forms of authentication are something you know, have , or are. The correct answers are: something you know, something you have, something you are

Question 3 Correct Mark 2.00 out of 2.00 Flag question

What is a secure virtual network called that uses the public network? Select one: IPS

"

VPN MPLS NAC IDS Firewall Refer to curriculum topic: 2.4.1 The term VPN describes a virtual network that uses encryption to protect data when traveling across Internet media. The correct answer is: VPN

Question 4 Incorrect Mark 0.00 out of 2.00 Flag question

What are the three states of data? (Choose three.) Select one or more:

!

' suspended in-transit in-cloud in-process at rest encrypted Refer to curriculum topic: 2.3.1 The protection of the cyber world requires cybersecurity professionals to account for the safeguarding of data in-transit, in-cloud, and at rest. The correct answers are: at rest, in-transit, inprocess

Question 5 Incorrect Mark 0.00 out of 2.00 Flag question

What name is given to a storage device connected to a network? Select one:

!

DAS NAS Cloud SAN RAID

Refer to curriculum topic: 2.3.1 NAS refers to a storage device connected to a network that allows storage and retrieval of data from a centralized location by authorized network users. The correct answer is: NAS

Question 6 Incorrect Mark 0.00 out of 2.00 Flag question

What principle prevents the disclosure of information to unauthorized people, resources, and processes? Select one:

!

availability confidentiality nonrepudiation integrity accounting

Refer to curriculum topic: 2.2.1 The security principle of confidentiality refers to the prevention of the disclosure of information to unauthorized people, resources, and processes. The correct answer is: confidentiality

Question 7 Correct Mark 2.00 out of 2.00 Flag question

What is identified by the first dimension of the cybersecurity cube? Select one: tools rules

"

goals knowledge safeguards

Refer to curriculum topic: 2.1.1 The first dimension of the cybersecurity sorcery cube identifies the goals or security principles required to protect the cyber world. The correct answer is: goals

Question 8 Incorrect Mark 0.00 out of 2.00 Flag question

What are three types of sensitive information? (Choose three.) Select one or more: PII declassified published

!

' public business classified

Refer to curriculum topic: 2.2.1 Sensitive information is information that would otherwise cause harm to a company or individual if publicly disclosed. The correct answers are: PII, business, classified

Question 9 Incorrect Mark 0.00 out of 2.00 Flag question

What are two methods that ensure confidentiality? (Choose two.) Select one or more: encryption nonrepudiation integrity authorization

!

' availability authentication

Refer to curriculum topic: 2.2.1 Confidentiality means viewing of information only for those who need to know. This can be accomplished by encrypting data and authenticating users who request access. The correct answers are: encryption, authentication

Question 10 Partially correct Mark 0.67 out of 2.00 Flag question

What are the three foundational principles of the cybersecurity domain? (Choose three.) Select one or more: policy integrity

"

' availability security encryption confidentiality

The correct answers are: confidentiality, integrity, availability

Question 11 Incorrect Mark 0.00 out of 2.00 Flag question

What type of cybersecurity laws protect you from an organization that might want to share your sensitive data? Select one: nonrepudiation privacy

!

authentication integrity confidentiality

Refer to curriculum topic: 2.2.1 Privacy laws control appropriate use of data and access to data. The correct answer is: privacy

Question 12 Incorrect Mark 0.00 out of 2.00 Flag question

What three tasks are accomplished by a comprehensive security policy? (Choose three.) Select one or more: sets rules for expected behavior defines legal consequences of violations

!

' useful for management vagueness gives security staff the backing of management is not legally binding Refer to curriculum topic: 2.4.3 Policy sets the establishment of rules and guidelines for the business.

The correct answers are: sets rules for expected behavior, defines legal consequences of violations, gives security staff the backing of management

Question 13 Partially correct Mark 0.67 out of 2.00 Flag question

What three methods help to ensure system availability? (Choose three.) Select one or more:

"

' up-to-date operating systems integrity checking system resiliency equipment maintenance system backups fire extinguishers The correct answers are: system backups, equipment maintenance, up-to-date operating systems

Question 14 Incorrect Mark 0.00 out of 2.00 Flag question

What mechanism can organizations use to prevent accidental changes by authorized users? Select one:

!

SHA-1 hashing version control encryption backups Refer to curriculum topic: 2.2.2 Version control ensures that two users cannot update the same object. The correct answer is: version control

Question 15 Incorrect Mark 0.00 out of 2.00 Flag question

What is a method of sending information from one device to another using removable media? Select one:

!

packet sneaker net infrared LAN wireless wired Refer to curriculum topic: 2.3.2 Sneaker net refers to hand delivering the removable data. The correct answer is: sneaker net

Question 16 Partially correct Mark 0.67 out of 2.00 Flag question

What three design principles help to ensure high availability? (Choose three.) Select one or more: provide for reliable crossover

"

' eliminate single points of failure check for data consistency detect failures as they occur ensure confidentiality use encryption

The correct answers are: detect failures as they occur, provide for reliable crossover, eliminate single points of failure

Question 17 Incorrect Mark 0.00 out of 2.00 Flag question

What are three access control security services? (Choose three.) Select one or more: authorization accounting

!

' access authentication repudiation availability Refer to curriculum topic: 2.2.1 This question refers to AAA authentication, authorization, and accountability. The correct answers are: authentication, authorization, accounting

Question 18 Incorrect Mark 0.00 out of 2.00 Flag question

What service determines which resources a user can access along with the operations that a user can perform? Select one:

!

token accounting authorization authentication biometric Refer to curriculum topic: 2.2.1 Authorization determines whether a user has certain access privileges. The correct answer is: authorization

Question 19 Incorrect Mark 0.00 out of 2.00 Flag question

What are two common hash functions? (Choose two.) Select one or more: Blowfish ' ECC

!

' RSA

!

MD5 SHA RC4 Refer to curriculum topic: 2.2.2 SHA and MD5 use use complex mathematical algorithms to compute hash values. The correct answers are: SHA, MD5

Question 20 Incorrect Mark 0.00 out of 2.00 Flag question

What name is given to any changes to the original data such as users manually modifying data, programs processing and changing data, and equipment failures? Select one: backup modification dissemination corruption

!

deletion integrity

Refer to curriculum topic: 2.3.3 Modification involves changes to the original data and not complete deletion of the data. The correct answer is: modification

Finish review

◀ Launch Chapter 2 Jump to...

Launch Chapter 3 ▶ Quiz navigation 1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

Show one page at a time

Finish review

NetAcad, a Cisco Corporate Social Responsibility program , is an IT skills and career building program available to learning institutions and individuals worldwide.

‫البنودوالشروط‬ Privacy Statement Cookie Policy Data Protection Trademarks Data Protection Accessibility Switch to the standard theme