Cybersecurity final
What three design principles help to ensure high availability? (Choose three.)
detect failures as they occur, provide for reliable crossover, eliminate single points of failure
Pick three types of records that cyber criminals would be interested in stealing from organizations. (Choose three.)
employment, medical, education
What are two methods that ensure confidentiality? (Choose two.)
encryption, authentication
Thwarting cyber criminals includes which of the following? (Choose two.)
establishing early warning systems, sharing cyber Intelligence information
What name is given to any changes to the original data such as users manually modifying data, programs processing and changing data, and equipment failures?
modification
What is a method of sending information from one device to another using removable media?
sneaker net
For the purpose of authentication, what three methods are used to verify identity? (Choose three.)
something you know, something you are, something you have
What are three access control security services? (Choose three.)
authentication, authorization, accounting
What service determines which resources a user can access along with the operations that a user can perform?
authorization
What does the term BYOD represent?
bring your own device
What principle prevents the disclosure of information to unauthorized people, resources, and processes?
confidentiality
What are three types of sensitive information? (Choose three.)
PII, business, classified
What are two common hash functions? (Choose two.)
SHA, MD5
What is a secure virtual network called that uses the public network?
VPN
What is the workforce framework category that includes highly specialized review and evaluation of incoming cybersecurity information to determine if it is useful for intelligence?
Analyze
What type of attack uses many systems to flood the resources of a target, thus making the target unavailable?
DDoS
What does the acronym IoE represent?
Internet of Everything
What is an example of an Internet data domain?
What does the term vulnerability mean?
a weakness that makes a target susceptible to an attack
What type of an attack can disable a computer by forcing it to use memory or by overworking its CPU?
algorithm
What is identified by the first dimension of the cybersecurity cube?
goals
What name is given to hackers who hack for a cause?
hactivist
What are the three states of data? (Choose three.)
in-transit, at rest, in-process
What name is given to a amateur hacker?
script kiddie
What mechanism can organizations use to prevent accidental changes by authorized users?
version control
What are the three foundational principles of the cybersecurity domain? (Choose three.)
confidentiality, integrity, availability
Which two methods help to ensure data integrity? (Choose two.)
data consistency checks, hashing
What type of cybersecurity laws protect you from an organization that might want to share your sensitive data?
privacy
What three tasks are accomplished by a comprehensive security policy? (Choose three.)
sets rules for expected behavior, defines legal consequences of violations, gives security staff the backing of management
What three methods help to ensure system availability? (Choose three.)
system backups, equipment maintenance, up-to-date operating systems