Last Updated on October 29, 2019 by Admin
Cybersecurity Essentials 1.1 Chapter 2 Quiz Online
CE -- Chapter 2 Quiz
Quiz-summary
0 of 20 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
Information
CE — Chapter 2 Quiz
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 20 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- Answered
- Review
-
Question 1 of 20
1. Question
2 pointsWhat are two common hash functions? (Choose two.)Correct
Incorrect
SHA and MD5 use use complex mathematical algorithms to compute hash values.
Hint
SHA and MD5 use use complex mathematical algorithms to compute hash values.
-
Question 2 of 20
2. Question
1 pointsWhat service determines which resources a user can access along with the operations that a user can perform?Correct
Incorrect
Authorization determines whether a user has certain access privileges.
Hint
Authorization determines whether a user has certain access privileges.
-
Question 3 of 20
3. Question
1 pointsWhat type of cybersecurity laws protect you from an organization that might want to share your sensitive data?Correct
Incorrect
Privacy laws control appropriate use of data and access to data.
Hint
Privacy laws control appropriate use of data and access to data.
-
Question 4 of 20
4. Question
3 pointsWhat three design principles help to ensure high availability? (Choose three.)Correct
Incorrect
High availability systems typically include these three design principles.
Hint
High availability systems typically include these three design principles.
-
Question 5 of 20
5. Question
3 pointsFor the purpose of authentication, what three methods are used to verify identity? (Choose three.)Correct
Incorrect
The forms of authentication are something you know, have , or are.
Hint
The forms of authentication are something you know, have , or are.
-
Question 6 of 20
6. Question
1 pointsWhat is a secure virtual network called that uses the public network?Correct
Incorrect
The term VPN describes a virtual network that uses encryption to protect data when traveling across Internet media.
Hint
The term VPN describes a virtual network that uses encryption to protect data when traveling across Internet media.
-
Question 7 of 20
7. Question
1 pointsWhat mechanism can organizations use to prevent accidental changes by authorized users?Correct
Incorrect
Version control ensures that two users cannot update the same object.
Hint
Version control ensures that two users cannot update the same object.
-
Question 8 of 20
8. Question
1 pointsWhat is a method of sending information from one device to another using removable media?Correct
Incorrect
Sneaker net refers to hand delivering the removable data.
Hint
Sneaker net refers to hand delivering the removable data.
-
Question 9 of 20
9. Question
3 pointsWhat are the three foundational principles of the cybersecurity domain? (Choose three.)Correct
Incorrect
Three foundational security principles are confidentiality, integrity and availability.
Hint
Three foundational security principles are confidentiality, integrity and availability.
-
Question 10 of 20
10. Question
3 pointsWhat are three access control security services? (Choose three.)Correct
Incorrect
This question refers to AAA authentication, authorization, and accountability.
Hint
This question refers to AAA authentication, authorization, and accountability.
-
Question 11 of 20
11. Question
2 pointsWhich two methods help to ensure data integrity? (Choose two.)Correct
Incorrect
Data integrity systems include one of the two data integrity methods.
Hint
Data integrity systems include one of the two data integrity methods.
-
Question 12 of 20
12. Question
3 pointsWhat three tasks are accomplished by a comprehensive security policy? (Choose three.)Correct
Incorrect
Policy sets the establishment of rules and guidelines for the business.
Hint
Policy sets the establishment of rules and guidelines for the business.
-
Question 13 of 20
13. Question
2 pointsWhat two methods help to ensure system availability? (Choose two.)Correct
Incorrect
-
Question 14 of 20
14. Question
1 pointsWhat principle prevents the disclosure of information to unauthorized people, resources, and processes?Correct
Incorrect
The security principle of confidentiality refers to the prevention of the disclosure of information to unauthorized people, resources, and processes.
Hint
The security principle of confidentiality refers to the prevention of the disclosure of information to unauthorized people, resources, and processes.
-
Question 15 of 20
15. Question
3 pointsWhat are the three states of data? (Choose three.)Correct
Incorrect
The protection of the cyber world requires cybersecurity professionals to account for the safeguarding of data in-transit, in-cloud, and at rest.
Hint
The protection of the cyber world requires cybersecurity professionals to account for the safeguarding of data in-transit, in-cloud, and at rest.
-
Question 16 of 20
16. Question
1 pointsWhat name is given to any changes to the original data such as users manually modifying data, programs processing and changing data, and equipment failures?Correct
Incorrect
Modification involves changes to the original data and not complete deletion of the data.
Hint
Modification involves changes to the original data and not complete deletion of the data.
-
Question 17 of 20
17. Question
1 pointsWhat is identified by the first dimension of the cybersecurity cube?Correct
Incorrect
The first dimension of the cybersecurity sorcery cube identifies the goals or security principles required to protect the cyber world.
Hint
The first dimension of the cybersecurity sorcery cube identifies the goals or security principles required to protect the cyber world.
-
Question 18 of 20
18. Question
1 pointsWhat name is given to a storage device connected to a network?Correct
Incorrect
NAS refers to a storage device connected to a network that allows storage and retrieval of data from a centralized location by authorized network users.
Hint
NAS refers to a storage device connected to a network that allows storage and retrieval of data from a centralized location by authorized network users.
-
Question 19 of 20
19. Question
2 pointsWhat are two methods that ensure confidentiality? (Choose two.)Correct
Incorrect
Confidentiality means viewing of information only for those who need to know. This can be accomplished by encrypting data and authenticating users who request access.
Hint
Confidentiality means viewing of information only for those who need to know. This can be accomplished by encrypting data and authenticating users who request access.
-
Question 20 of 20
20. Question
3 pointsWhat are three types of sensitive information? (Choose three.)Correct
Incorrect
Sensitive information is information that would otherwise cause harm to a company or individual if publicly disclosed.
Hint
Sensitive information is information that would otherwise cause harm to a company or individual if publicly disclosed.