Cybersecurity Essentials 1.1 – Chapter 2: The Cybersecurity Cube Quiz Answers Full 100% 2023 2024
-
What are two common hash functions? (Choose two.)
- Blowfish
- ECC
- RC4
- SHA
- MD5
- RSA
Explanation:
SHA and MD5 use use complex mathematical algorithms to compute hash values.
-
What service determines which resources a user can access along with the operations that a user can perform?
- authentication
- biometric
- accounting
- token
- authorization
Explanation:
Authorization determines whether a user has certain access privileges.
-
What type of cybersecurity laws protect you from an organization that might want to share your sensitive data?
- confidentiality
- nonrepudiation
- authentication
- privacy
- integrity
Explanation:
Privacy laws control appropriate use of data and access to data.
-
What three design principles help to ensure high availability? (Choose three.)
- eliminate single points of failure
- provide for reliable crossover
- ensure confidentiality
- check for data consistency
- use encryption
- detect failures as they occur
Explanation:
High availability systems typically include these three design principles.
-
For the purpose of authentication, what three methods are used to verify identity? (Choose three.)
- something you know
- something you do
- something you have
- where you are
- something you are
Explanation:
The forms of authentication are something you know, have , or are.
-
What is a secure virtual network called that uses the public network?
- IPS
- IDS
- MPLS
- NAC
- Firewall
- VPN
Explanation:
The term VPN describes a virtual network that uses encryption to protect data when traveling across Internet media.
-
What mechanism can organizations use to prevent accidental changes by authorized users?
- SHA-1
- backups
- version control
- hashing
- encryption
Explanation:
Version control ensures that two users cannot update the same object.
-
What is a method of sending information from one device to another using removable media?
- wired
- infrared
- LAN
- packet
- wireless
- sneaker net
Explanation:
Sneaker net refers to hand delivering the removable data.
-
What are the three foundational principles of the cybersecurity domain? (Choose three.)
- policy
- integrity
- availability
- confidentiality
- security
- encryption
Explanation:
Three foundational security principles are confidentiality, integrity and availability.
-
What are three access control security services? (Choose three.)
- access
- authentication
- repudiation
- authorization
- accounting
- availability
Explanation:
This question refers to AAA authentication, authorization, and accountability.
-
Which two methods help to ensure data integrity? (Choose two.)
- availability
- data consistency checks
- privacy
- hashing
- authorization
- repudiation
Explanation:
Data integrity systems include one of the two data integrity methods.
-
What three tasks are accomplished by a comprehensive security policy? (Choose three.)
- useful for management
- defines legal consequences of violations
- is not legally binding
- gives security staff the backing of management
- vagueness
- sets rules for expected behavior
Explanation:
Policy sets the establishment of rules and guidelines for the business.
-
What two methods help to ensure system availability? (Choose two.)
- integrity checking
- system backups
- up-to-date operating systems
- system resiliency
- fire extinguishers
- equipment maintenance
-
What principle prevents the disclosure of information to unauthorized people, resources, and processes?
- integrity
- confidentiality
- nonrepudiation
- accounting
- availability
Explanation:
The security principle of confidentiality refers to the prevention of the disclosure of information to unauthorized people, resources, and processes.
-
What are the three states of data? (Choose three.)
- suspended
- in-cloud
- at rest
- in-transit
- in-process
- encrypted
Explanation:
The protection of the cyber world requires cybersecurity professionals to account for the safeguarding of data in-transit, in-cloud, and at rest.
-
What name is given to any changes to the original data such as users manually modifying data, programs processing and changing data, and equipment failures?
- deletion
- modification
- dissemination
- corruption
- backup
- integrity
Explanation:
Modification involves changes to the original data and not complete deletion of the data.
-
What is identified by the first dimension of the cybersecurity cube?
- goals
- safeguards
- rules
- tools
- knowledge
Explanation:
The first dimension of the cybersecurity sorcery cube identifies the goals or security principles required to protect the cyber world.
-
What name is given to a storage device connected to a network?
- NAS
- SAN
- RAID
- Cloud
- DAS
Explanation:
NAS refers to a storage device connected to a network that allows storage and retrieval of data from a centralized location by authorized network users.
-
What are two methods that ensure confidentiality? (Choose two.)
- authorization
- availability
- nonrepudiation
- authentication
- integrity
- encryption
Explanation:
Confidentiality means viewing of information only for those who need to know. This can be accomplished by encrypting data and authenticating users who request access.
-
What are three types of sensitive information? (Choose three.)
- business
- published
- declassified
- public
- classified
- PII
Explanation:
Sensitive information is information that would otherwise cause harm to a company or individual if publicly disclosed.
-
What three methods help to ensure system availability? (Choose three.)
- system resiliency
- integrity checking
- equipment maintenance
- up-to-date operating systems
- system backups
- fire extinguishers
Explanation Hint:
The correct answers are: system backups, equipment maintenance, up-to-date operating systems
Subscribe
0 Comments
Newest