Cybersecurity Essentials Chapter 2 Quiz Questions Answers

Cybersecurity Essentials 1.1 Chapter 2 Quiz Answers Full Questions

Chapter 2: The Cybersecurity Cube

1. What is identified by the first dimension of the cybersecurity cube?

  • tools
  • knowledge
  • goals
  • safeguards
  • rules

Explanation: The first dimension of the cybersecurity sorcery cube identifies the goals or security principles required to protect the cyber world.

2. What are three types of sensitive information? (Choose three.)

  • declassified
  • public
  • PII
  • business
  • published
  • classified

Explanation: Sensitive information is information that would otherwise cause harm to a company or individual if publicly disclosed.

3. What are two common hash functions? (Choose two.)

  • Blowfish
  • SHA
  • MD5
  • ECC
  • RC4
  • RSA

Explanation: SHA and MD5 use use complex mathematical algorithms to compute hash values.

4. What service determines which resources a user can access along with the operations that a user can perform?

  • authentication
  • biometric
  • authorization
  • accounting
  • token

Explanation: Authorization determines whether a user has certain access privileges.

5. What type of cybersecurity laws protect you from an organization that might want to share your sensitive data?

  • authentication
  • confidentiality
  • nonrepudiation
  • privacy
  • integrity

Explanation: Privacy laws control appropriate use of data and access to data.

6. What three design principles help to ensure high availability? (Choose three.)

  • detect failures as they occur
  • eliminate single points of failure
  • check for data consistency
  • use encryption
  • provide for reliable crossover
  • ensure confidentiality

Explanation: High availability systems typically include these three design principles.

7. For the purpose of authentication, what three methods are used to verify identity? (Choose three.)

  • where you are
  • something you are
  • something you know
  • something you do
  • something you have

Explanation: The forms of authentication are something you know, have , or are.

8. What two methods help to ensure system availability? (Choose two.)

  • integrity checking
  • system backups
  • up-to-date operating systems
  • system resiliency
  • fire extinguishers
  • equipment maintenance

9. What name is given to a storage device connected to a network?

  • NAS
  • SAN
  • RAID
  • Cloud
  • DAS

Explanation: NAS refers to a storage device connected to a network that allows storage and retrieval of data from a centralized location by authorized network users.

10. What are two methods that ensure confidentiality? (Choose two.)

  • authorization
  • availability
  • nonrepudiation
  • authentication
  • integrity
  • encryption

Explanation: Confidentiality means viewing of information only for those who need to know. This can be accomplished by encrypting data and authenticating users who request access.

11. What is a secure virtual network called that uses the public network?

  • MPLS
  • IDS
  • Firewall
  • NAC
  • IPS
  • VPN

Explanation: The term VPN describes a virtual network that uses encryption to protect data when traveling across Internet media.

12. What mechanism can organizations use to prevent accidental changes by authorized users?

  • SHA-1
  • backups
  • version control
  • hashing
  • encryption

Explanation: Version control ensures that two users cannot update the same object.

13. What is a method of sending information from one device to another using removable media?

  • wired
  • infrared
  • LAN
  • packet
  • wireless
  • sneaker net

Explanation: Sneaker net refers to hand delivering the removable data.

14. What are the three foundational principles of the cybersecurity domain? (Choose three.)

  • policy
  • integrity
  • availability
  • confidentiality
  • security
  • encryption

Explanation: Three foundational security principles are confidentiality, integrity and availability.

15. Which two methods help to ensure data integrity? (Choose two.)

  • data consistency checks
  • privacy
  • hashing
  • availability
  • authorization
  • repudiation

Explanation: Data integrity systems include one of the two data integrity methods.

16. What three tasks are accomplished by a comprehensive security policy? (Choose three.)

  • useful for management
  • defines legal consequences of violations
  • is not legally binding
  • gives security staff the backing of management
  • vagueness
  • sets rules for expected behavior

Explanation: Policy sets the establishment of rules and guidelines for the business.

17. What principle prevents the disclosure of information to unauthorized people, resources, and processes?

  • integrity
  • confidentiality
  • nonrepudiation
  • accounting
  • availability

Explanation: The security principle of confidentiality refers to the prevention of the disclosure of information to unauthorized people, resources, and processes.

18. What are the three states of data? (Choose three.)

  • suspended
  • in-cloud
  • at rest
  • in-transit
  • in-process
  • encrypted

Explanation: The protection of the cyber world requires cybersecurity professionals to account for the safeguarding of data in-transit, in-cloud, and at rest.

19. What name is given to any changes to the original data such as users manually modifying data, programs processing and changing data, and equipment failures?

  • deletion
  • modification
  • dissemination
  • corruption
  • backup
  • integrity

Explanation: Modification involves changes to the original data and not complete deletion of the data.

20. What are three access control security services? (Choose three.)

  • access
  • authentication
  • repudiation
  • authorization
  • accounting
  • availability

Explanation: This question refers to AAA authentication, authorization, and accountability.


Inline Feedbacks
View all comments
Would love your thoughts, please comment.x