Essentials of Info Security Test 1 - Questions From Quizzes

Ace your homework & exams now with Quizwiz!

What type of attack uses many systems to flood the resources of a target, thus making the target unavailable? a. ping sweep b. spoof c. DDoS d. DoS

c. DDoS

What is a secure virtual network called that uses the public network? a. IPS b. MPLS c. VPN d. NAC e. IDS f. Firewall

c. VPN

What is an example of an Internet data domain? a. Juniper b. Linkedin c. Palo Alto d. Cisco

b. Linkedin

What name is given to a storage device connected to a network? a. RAID b. NAS c. DAS d. Cloud e. SAN

b. NAS

What are two methods that ensure confidentiality? (Choose two.) a. nonrepudiation b. encryption c. availability d. authentication e. integrity f. authorization

b. encryption d. authentication

What is identified by the first dimension of the cybersecurity cube? a. safeguards b. tools c. rules d. knowledge e. goals

e. goals

What is a method of sending information from one device to another using removable media? a. LAN b. wired c. infrared d. wireless e. packet f. sneaker net

f. sneaker net

What does the term vulnerability mean? a. a computer that contains sensitive information b. a known target or victim machine c. a potential threat that a hacker creates d. a weakness that makes a target susceptible to an attack e. a method of attack to exploit a target

d. a weakness that makes a target susceptible to an attack

What name is given to a amateur hacker? a. blue team b. black hat c. red hat d. script kiddie

d. script kiddie

What name is given to hackers who hack for a cause? a. blue hat b. white hat c. hactivist d. hacker

c. hactivist

What is the workforce framework category that includes highly specialized review and evaluation of incoming cybersecurity information to determine if it is useful for intelligence? a. Analyze b. Protect and Defend c. Securely Provision d. Oversight and Development

a. Analyze

What does the acronym IoE represent? a. Internet of Everything b. Insight into Everything c. Internet of Everyday d. Intelligence on Everything

a. Internet of Everything

What are two common hash functions? (Choose two.) a. SHA b. MD5 c. Blowfish d. ECC e. RC4 f. RSA

a. SHA b. MD5

What type of an attack can disable a computer by forcing it to use memory or by overworking its CPU? a. algorithm b. exhaustion c. DDoS d. APT

a. algorithm

What are the three states of data? (Choose three.) a. at rest b. in-cloud c. encrypted d. in-process e. in-transit f. suspended

a. at rest d. in-process e. in-transit

What are the three foundational principles of the cybersecurity domain? (Choose three.) a. availability b. encryption c. confidentiality d. security e. policy f. integrity

a. availability c. confidentiality f. integrity

What does the term BYOD represent? a. bring your own device b. bring your own disaster c. bring your own decision d. buy your own disaster

a. bring your own device

What are three types of sensitive information? (Choose three.) a. business b. published c. declassified d. public e. classified f. PII

a. business e. classified f. PII

Thwarting cyber criminals includes which of the following? (Choose two.) a. establishing early warning systems b. changing operating systems c. shutting down the network d. hiring hackers e. sharing cyber Intelligence information

a. establishing early warning systems e. sharing cyber Intelligence information

What two methods help to ensure system availability? (Choose two.) a. up-to-date operating systems b. system backups c. system resiliency d. equipment maintenance e. integrity checking f. fire extinguishers

a. up-to-date operating systems d. equipment maintenance

What service determines which resources a user can access along with the operations that a user can perform? a. accounting b. authorization c. token d. biometric e. authentication

b. authorization

What name is given to any changes to the original data such as users manually modifying data, programs processing and changing data, and equipment failures? a. integrity b. modification c. corruption d. backup e. dissemination e. deletion

b. modification

What type of cybersecurity laws protect you from an organization that might want to share your sensitive data? a. integrity b. privacy c. authentication d. confidentiality e. nonrepudiation

b. privacy

What three design principles help to ensure high availability? (Choose three.) a. check for data consistency b. provide for reliable crossover c. ensure confidentiality d. eliminate single points of failure e. use encryption f. detect failures as they occur

b. provide for reliable crossover d. eliminate single points of failure f. detect failures as they occur

For the purpose of authentication, what three methods are used to verify identity? (Choose three.) a. where you are b. something you have c. something you do d. something you are e. something you know

b. something you have d. something you are e. something you know

What are three access control security services? (Choose three.) a. access b. availability c. authentication d. repudiation e. accounting f. authorization

c. authentication e. accounting f. authorization

What principle prevents the disclosure of information to unauthorized people, resources, and processes? a. integrity b. availability c. confidentiality d. accounting e. nonrepudiation

c. confidentiality

What three tasks are accomplished by a comprehensive security policy? (Choose three.) a. is not legally binding b. vagueness c. defines legal consequences of violations d. useful for management e. gives security staff the backing of management f. sets rules for expected behavior

c. defines legal consequences of violations e. gives security staff the backing of management f. sets rules for expected behavior

Which two methods help to ensure data integrity? (Choose two.) a. authorization b. privacy c. availability d. repudiation e. hashing f. data consistency checks

e. hashing f. data consistency checks

What mechanism can organizations use to prevent accidental changes by authorized users? a. hashing b. encryption c. backups d. SHA-1 e. version control

e. version control


Related study sets

Unit 1: Order of Operations and Whole Numbers

View Set

PrepU Chapter 23: Asepsis and Infection Control

View Set

What month is your birthday? 🎂 你的生日是幾月?

View Set

Fetal Thorax/ Neural Axis (ch59/60)

View Set

Generative Design for Industrial Applications

View Set