Cybersecurity Essentials v1.1 Chapter 2 Quiz Answers

Cybersecurity Essentials v1.1 Chapter 2 Quiz Answers

1. What are two common hash functions? (Choose two.)

Blowfish
ECC
RC4
SHA*
MD5*
RSA

Explanation:
SHA and MD5 use use complex mathematical algorithms to compute hash values.

2. What service determines which resources a user can access along with the operations that a user can perform?

authentication
biometric
accounting
token
authorization*

Explanation:
Authorization determines whether a user has certain access privileges.

3. What type of cybersecurity laws protect you from an organization that might want to share your sensitive data?

confidentiality
nonrepudiation
authentication
privacy*
integrity

Explanation:
Privacy laws control appropriate use of data and access to data.

4. What three design principles help to ensure high availability? (Choose three.)

eliminate single points of failure*
provide for reliable crossover*
ensure confidentiality
check for data consistency
use encryption
detect failures as they occur*

Explanation:
High availability systems typically include these three design principles.

5. For the purpose of authentication, what three methods are used to verify identity? (Choose three.)

something you know*
something you do
something you have*
where you are
something you are*

Explanation:
The forms of authentication are something you know, have , or are.

6. What is a secure virtual network called that uses the public network?

IPS
IDS
MPLS
NAC
Firewall
VPN*

Explanation:
The term VPN describes a virtual network that uses encryption to protect data when traveling across Internet media.

7. What mechanism can organizations use to prevent accidental changes by authorized users?

SHA-1
backups
version control*
hashing
encryption

Explanation:
Version control ensures that two users cannot update the same object.

8. What is a method of sending information from one device to another using removable media?

wired
infrared
LAN
packet
wireless
sneaker net*

Explanation:
Sneaker net refers to hand delivering the removable data.

9. What are the three foundational principles of the cybersecurity domain? (Choose three.)

policy
integrity*
availability*
confidentiality*
security
encryption

Explanation:
Three foundational security principles are confidentiality, integrity and availability.

10. What are three access control security services? (Choose three.)

access
authentication*
repudiation
authorization*
accounting*
availability

Explanation:
This question refers to AAA authentication, authorization, and accountability.

11. Which two methods help to ensure data integrity? (Choose two.)

availability
data consistency checks*
privacy
hashing*
authorization
repudiation

Explanation:
Data integrity systems include one of the two data integrity methods.

12. What three tasks are accomplished by a comprehensive security policy? (Choose three.)

useful for management
defines legal consequences of violations*
is not legally binding
gives security staff the backing of management*
vagueness
sets rules for expected behavior*

Explanation:
Policy sets the establishment of rules and guidelines for the business.

13. What two methods help to ensure system availability? (Choose two.)

integrity checking
system backups
up-to-date operating systems*
system resiliency
fire extinguishers
equipment maintenance*

14. What principle prevents the disclosure of information to unauthorized people, resources, and processes?

integrity
confidentiality*
nonrepudiation
accounting
availability

Explanation:
The security principle of confidentiality refers to the prevention of the disclosure of information to unauthorized people, resources, and processes.

15. What are the three states of data? (Choose three.)

suspended
in-cloud
at rest*
in-transit*
in-process*
encrypted

Explanation:
The protection of the cyber world requires cybersecurity professionals to account for the safeguarding of data in-transit, in-cloud, and at rest.

16. What name is given to any changes to the original data such as users manually modifying data, programs processing and changing data, and equipment failures?

deletion
modification*
dissemination
corruption
backup
integrity

Explanation:
Modification involves changes to the original data and not complete deletion of the data.

17. What is identified by the first dimension of the cybersecurity cube?

Goals*
safeguards
rules
tools
knowledge

Explanation:
The first dimension of the cybersecurity sorcery cube identifies the goals or security principles required to protect the cyber world.

18. What name is given to a storage device connected to a network?

NAS*
SAN
RAID
Cloud
DAS

Explanation:
NAS refers to a storage device connected to a network that allows storage and retrieval of data from a centralized location by authorized network users.

19. What are two methods that ensure confidentiality? (Choose two.)

authorization
availability
nonrepudiation
authentication*
integrity
encryption*

Explanation:
Confidentiality means viewing of information only for those who need to know. This can be accomplished by encrypting data and authenticating users who request access.

20. What are three types of sensitive information? (Choose three.)

Business*
published
declassified
public
classified*
PII

Explanation:
Sensitive information is information that would otherwise cause harm to a company or individual if publicly disclosed.

0 0 votes
Article Rating
Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x