Cybersecurity Essentials v1.1 Chapter 2 Quiz Answers
1. What are two common hash functions? (Choose two.)
Blowfish
ECC
RC4
SHA*
MD5*
RSA
2. What service determines which resources a user can access along with the operations that a user can perform?
authentication
biometric
accounting
token
authorization*
3. What type of cybersecurity laws protect you from an organization that might want to share your sensitive data?
confidentiality
nonrepudiation
authentication
privacy*
integrity
4. What three design principles help to ensure high availability? (Choose three.)
eliminate single points of failure*
provide for reliable crossover*
ensure confidentiality
check for data consistency
use encryption
detect failures as they occur*
5. For the purpose of authentication, what three methods are used to verify identity? (Choose three.)
something you know*
something you do
something you have*
where you are
something you are*
6. What is a secure virtual network called that uses the public network?
IPS
IDS
MPLS
NAC
Firewall
VPN*
7. What mechanism can organizations use to prevent accidental changes by authorized users?
SHA-1
backups
version control*
hashing
encryption
8. What is a method of sending information from one device to another using removable media?
wired
infrared
LAN
packet
wireless
sneaker net*
9. What are the three foundational principles of the cybersecurity domain? (Choose three.)
policy
integrity*
availability*
confidentiality*
security
encryption
10. What are three access control security services? (Choose three.)
access
authentication*
repudiation
authorization*
accounting*
availability
11. Which two methods help to ensure data integrity? (Choose two.)
availability
data consistency checks*
privacy
hashing*
authorization
repudiation
12. What three tasks are accomplished by a comprehensive security policy? (Choose three.)
useful for management
defines legal consequences of violations*
is not legally binding
gives security staff the backing of management*
vagueness
sets rules for expected behavior*
13. What two methods help to ensure system availability? (Choose two.)
integrity checking
system backups
up-to-date operating systems*
system resiliency
fire extinguishers
equipment maintenance*
14. What principle prevents the disclosure of information to unauthorized people, resources, and processes?
integrity
confidentiality*
nonrepudiation
accounting
availability
15. What are the three states of data? (Choose three.)
suspended
in-cloud
at rest*
in-transit*
in-process*
encrypted
16. What name is given to any changes to the original data such as users manually modifying data, programs processing and changing data, and equipment failures?
deletion
modification*
dissemination
corruption
backup
integrity
17. What is identified by the first dimension of the cybersecurity cube?
Goals*
safeguards
rules
tools
knowledge
18. What name is given to a storage device connected to a network?
NAS*
SAN
RAID
Cloud
DAS
19. What are two methods that ensure confidentiality? (Choose two.)
authorization
availability
nonrepudiation
authentication*
integrity
encryption*
20. What are three types of sensitive information? (Choose three.)
Business*
published
declassified
public
classified*
PII