Essentials of Info Security Test 1 - Questions From Quizzes
What type of attack uses many systems to flood the resources of a target, thus making the target unavailable? a. ping sweep b. spoof c. DDoS d. DoS
c. DDoS
What is a secure virtual network called that uses the public network? a. IPS b. MPLS c. VPN d. NAC e. IDS f. Firewall
c. VPN
What is an example of an Internet data domain? a. Juniper b. Linkedin c. Palo Alto d. Cisco
b. Linkedin
What name is given to a storage device connected to a network? a. RAID b. NAS c. DAS d. Cloud e. SAN
b. NAS
What are two methods that ensure confidentiality? (Choose two.) a. nonrepudiation b. encryption c. availability d. authentication e. integrity f. authorization
b. encryption d. authentication
What is identified by the first dimension of the cybersecurity cube? a. safeguards b. tools c. rules d. knowledge e. goals
e. goals
What is a method of sending information from one device to another using removable media? a. LAN b. wired c. infrared d. wireless e. packet f. sneaker net
f. sneaker net
What does the term vulnerability mean? a. a computer that contains sensitive information b. a known target or victim machine c. a potential threat that a hacker creates d. a weakness that makes a target susceptible to an attack e. a method of attack to exploit a target
d. a weakness that makes a target susceptible to an attack
What name is given to a amateur hacker? a. blue team b. black hat c. red hat d. script kiddie
d. script kiddie
What name is given to hackers who hack for a cause? a. blue hat b. white hat c. hactivist d. hacker
c. hactivist
What is the workforce framework category that includes highly specialized review and evaluation of incoming cybersecurity information to determine if it is useful for intelligence? a. Analyze b. Protect and Defend c. Securely Provision d. Oversight and Development
a. Analyze
What does the acronym IoE represent? a. Internet of Everything b. Insight into Everything c. Internet of Everyday d. Intelligence on Everything
a. Internet of Everything
What are two common hash functions? (Choose two.) a. SHA b. MD5 c. Blowfish d. ECC e. RC4 f. RSA
a. SHA b. MD5
What type of an attack can disable a computer by forcing it to use memory or by overworking its CPU? a. algorithm b. exhaustion c. DDoS d. APT
a. algorithm
What are the three states of data? (Choose three.) a. at rest b. in-cloud c. encrypted d. in-process e. in-transit f. suspended
a. at rest d. in-process e. in-transit
What are the three foundational principles of the cybersecurity domain? (Choose three.) a. availability b. encryption c. confidentiality d. security e. policy f. integrity
a. availability c. confidentiality f. integrity
What does the term BYOD represent? a. bring your own device b. bring your own disaster c. bring your own decision d. buy your own disaster
a. bring your own device
What are three types of sensitive information? (Choose three.) a. business b. published c. declassified d. public e. classified f. PII
a. business e. classified f. PII
Thwarting cyber criminals includes which of the following? (Choose two.) a. establishing early warning systems b. changing operating systems c. shutting down the network d. hiring hackers e. sharing cyber Intelligence information
a. establishing early warning systems e. sharing cyber Intelligence information
What two methods help to ensure system availability? (Choose two.) a. up-to-date operating systems b. system backups c. system resiliency d. equipment maintenance e. integrity checking f. fire extinguishers
a. up-to-date operating systems d. equipment maintenance
What service determines which resources a user can access along with the operations that a user can perform? a. accounting b. authorization c. token d. biometric e. authentication
b. authorization
What name is given to any changes to the original data such as users manually modifying data, programs processing and changing data, and equipment failures? a. integrity b. modification c. corruption d. backup e. dissemination e. deletion
b. modification
What type of cybersecurity laws protect you from an organization that might want to share your sensitive data? a. integrity b. privacy c. authentication d. confidentiality e. nonrepudiation
b. privacy
What three design principles help to ensure high availability? (Choose three.) a. check for data consistency b. provide for reliable crossover c. ensure confidentiality d. eliminate single points of failure e. use encryption f. detect failures as they occur
b. provide for reliable crossover d. eliminate single points of failure f. detect failures as they occur
For the purpose of authentication, what three methods are used to verify identity? (Choose three.) a. where you are b. something you have c. something you do d. something you are e. something you know
b. something you have d. something you are e. something you know
What are three access control security services? (Choose three.) a. access b. availability c. authentication d. repudiation e. accounting f. authorization
c. authentication e. accounting f. authorization
What principle prevents the disclosure of information to unauthorized people, resources, and processes? a. integrity b. availability c. confidentiality d. accounting e. nonrepudiation
c. confidentiality
What three tasks are accomplished by a comprehensive security policy? (Choose three.) a. is not legally binding b. vagueness c. defines legal consequences of violations d. useful for management e. gives security staff the backing of management f. sets rules for expected behavior
c. defines legal consequences of violations e. gives security staff the backing of management f. sets rules for expected behavior
Which two methods help to ensure data integrity? (Choose two.) a. authorization b. privacy c. availability d. repudiation e. hashing f. data consistency checks
e. hashing f. data consistency checks
What mechanism can organizations use to prevent accidental changes by authorized users? a. hashing b. encryption c. backups d. SHA-1 e. version control
e. version control