Cybersecurity final

¡Supera tus tareas y exámenes ahora con Quizwiz!

What three design principles help to ensure high availability? (Choose three.)

detect failures as they occur, provide for reliable crossover, eliminate single points of failure

Pick three types of records that cyber criminals would be interested in stealing from organizations. (Choose three.)

employment, medical, education

What are two methods that ensure confidentiality? (Choose two.)

encryption, authentication

Thwarting cyber criminals includes which of the following? (Choose two.)

establishing early warning systems, sharing cyber Intelligence information

What name is given to any changes to the original data such as users manually modifying data, programs processing and changing data, and equipment failures?

modification

What is a method of sending information from one device to another using removable media?

sneaker net

For the purpose of authentication, what three methods are used to verify identity? (Choose three.)

something you know, something you are, something you have

What are three access control security services? (Choose three.)

authentication, authorization, accounting

What service determines which resources a user can access along with the operations that a user can perform?

authorization

What does the term BYOD represent?

bring your own device

What principle prevents the disclosure of information to unauthorized people, resources, and processes?

confidentiality

What are three types of sensitive information? (Choose three.)

PII, business, classified

What are two common hash functions? (Choose two.)

SHA, MD5

What is a secure virtual network called that uses the public network?

VPN

What is the workforce framework category that includes highly specialized review and evaluation of incoming cybersecurity information to determine if it is useful for intelligence?

Analyze

What type of attack uses many systems to flood the resources of a target, thus making the target unavailable?

DDoS

What does the acronym IoE represent?

Internet of Everything

What is an example of an Internet data domain?

Linkedin

What does the term vulnerability mean?

a weakness that makes a target susceptible to an attack

What type of an attack can disable a computer by forcing it to use memory or by overworking its CPU?

algorithm

What is identified by the first dimension of the cybersecurity cube?

goals

What name is given to hackers who hack for a cause?

hactivist

What are the three states of data? (Choose three.)

in-transit, at rest, in-process

What name is given to a amateur hacker?

script kiddie

What mechanism can organizations use to prevent accidental changes by authorized users?

version control

What are the three foundational principles of the cybersecurity domain? (Choose three.)

confidentiality, integrity, availability

Which two methods help to ensure data integrity? (Choose two.)

data consistency checks, hashing

What type of cybersecurity laws protect you from an organization that might want to share your sensitive data?

privacy

What three tasks are accomplished by a comprehensive security policy? (Choose three.)

sets rules for expected behavior, defines legal consequences of violations, gives security staff the backing of management

What three methods help to ensure system availability? (Choose three.)

system backups, equipment maintenance, up-to-date operating systems


Conjuntos de estudio relacionados

Prep U for test 2; Urinary and rectal

View Set

Give Me Liberty!: Chapter 16 (Multiple Choice)

View Set

Principles of Marketing: Chapter 11 Assignment

View Set

Sosiologi (XIV) Perubahan Sosial dan Pembangunan

View Set

reasons for British withdrawal from Palestine 1948

View Set

Wisdom Literature - Job Test (Witte)

View Set