Cybersecurity Essentials 1.1 Chapter 2 Quiz Answers Full Questions
Chapter 2: The Cybersecurity Cube
1. What is identified by the first dimension of the cybersecurity cube?
- tools
- knowledge
- goals
- safeguards
- rules
2. What are three types of sensitive information? (Choose three.)
- declassified
- public
- PII
- business
- published
- classified
3. What are two common hash functions? (Choose two.)
- Blowfish
- SHA
- MD5
- ECC
- RC4
- RSA
4. What service determines which resources a user can access along with the operations that a user can perform?
- authentication
- biometric
- authorization
- accounting
- token
5. What type of cybersecurity laws protect you from an organization that might want to share your sensitive data?
- authentication
- confidentiality
- nonrepudiation
- privacy
- integrity
6. What three design principles help to ensure high availability? (Choose three.)
- detect failures as they occur
- eliminate single points of failure
- check for data consistency
- use encryption
- provide for reliable crossover
- ensure confidentiality
7. For the purpose of authentication, what three methods are used to verify identity? (Choose three.)
- where you are
- something you are
- something you know
- something you do
- something you have
8. What two methods help to ensure system availability? (Choose two.)
- integrity checking
- system backups
- up-to-date operating systems
- system resiliency
- fire extinguishers
- equipment maintenance
9. What name is given to a storage device connected to a network?
- NAS
- SAN
- RAID
- Cloud
- DAS
10. What are two methods that ensure confidentiality? (Choose two.)
- authorization
- availability
- nonrepudiation
- authentication
- integrity
- encryption
11. What is a secure virtual network called that uses the public network?
- MPLS
- IDS
- Firewall
- NAC
- IPS
- VPN
12. What mechanism can organizations use to prevent accidental changes by authorized users?
- SHA-1
- backups
- version control
- hashing
- encryption
13. What is a method of sending information from one device to another using removable media?
- wired
- infrared
- LAN
- packet
- wireless
- sneaker net
14. What are the three foundational principles of the cybersecurity domain? (Choose three.)
- policy
- integrity
- availability
- confidentiality
- security
- encryption
15. Which two methods help to ensure data integrity? (Choose two.)
- data consistency checks
- privacy
- hashing
- availability
- authorization
- repudiation
16. What three tasks are accomplished by a comprehensive security policy? (Choose three.)
- useful for management
- defines legal consequences of violations
- is not legally binding
- gives security staff the backing of management
- vagueness
- sets rules for expected behavior
17. What principle prevents the disclosure of information to unauthorized people, resources, and processes?
- integrity
- confidentiality
- nonrepudiation
- accounting
- availability
18. What are the three states of data? (Choose three.)
- suspended
- in-cloud
- at rest
- in-transit
- in-process
- encrypted
19. What name is given to any changes to the original data such as users manually modifying data, programs processing and changing data, and equipment failures?
- deletion
- modification
- dissemination
- corruption
- backup
- integrity
20. What are three access control security services? (Choose three.)
- access
- authentication
- repudiation
- authorization
- accounting
- availability
21. What three methods help to ensure system availability? (Choose three.)
- system backups
- system resiliency
- equipment maintenance
- fire extinguishers
- up-to-date operating systems
- integrity checking
What three methods help to ensure system availability? (Choose three.)
up-to-date operating systems
system resiliency
fire extinguishers
equipment maintenance
system backups
integrity checking