Cybersecurity Essentials Chapter 2 Quiz Questions Answers

Cybersecurity Essentials 1.1 Chapter 2 Quiz Answers Full Questions

Chapter 2: The Cybersecurity Cube

1. What is identified by the first dimension of the cybersecurity cube?

  • tools
  • knowledge
  • goals
  • safeguards
  • rules

Explanation: The first dimension of the cybersecurity sorcery cube identifies the goals or security principles required to protect the cyber world.

2. What are three types of sensitive information? (Choose three.)

  • declassified
  • public
  • PII
  • business
  • published
  • classified

Explanation: Sensitive information is information that would otherwise cause harm to a company or individual if publicly disclosed.

3. What are two common hash functions? (Choose two.)

  • Blowfish
  • SHA
  • MD5
  • ECC
  • RC4
  • RSA

Explanation: SHA and MD5 use use complex mathematical algorithms to compute hash values.

4. What service determines which resources a user can access along with the operations that a user can perform?

  • authentication
  • biometric
  • authorization
  • accounting
  • token

Explanation: Authorization determines whether a user has certain access privileges.

5. What type of cybersecurity laws protect you from an organization that might want to share your sensitive data?

  • authentication
  • confidentiality
  • nonrepudiation
  • privacy
  • integrity

Explanation: Privacy laws control appropriate use of data and access to data.

6. What three design principles help to ensure high availability? (Choose three.)

  • detect failures as they occur
  • eliminate single points of failure
  • check for data consistency
  • use encryption
  • provide for reliable crossover
  • ensure confidentiality

Explanation: High availability systems typically include these three design principles.

7. For the purpose of authentication, what three methods are used to verify identity? (Choose three.)

  • where you are
  • something you are
  • something you know
  • something you do
  • something you have

Explanation: The forms of authentication are something you know, have , or are.

8. What two methods help to ensure system availability? (Choose two.)

  • integrity checking
  • system backups
  • up-to-date operating systems
  • system resiliency
  • fire extinguishers
  • equipment maintenance

9. What name is given to a storage device connected to a network?

  • NAS
  • SAN
  • RAID
  • Cloud
  • DAS

Explanation: NAS refers to a storage device connected to a network that allows storage and retrieval of data from a centralized location by authorized network users.

10. What are two methods that ensure confidentiality? (Choose two.)

  • authorization
  • availability
  • nonrepudiation
  • authentication
  • integrity
  • encryption

Explanation: Confidentiality means viewing of information only for those who need to know. This can be accomplished by encrypting data and authenticating users who request access.

11. What is a secure virtual network called that uses the public network?

  • MPLS
  • IDS
  • Firewall
  • NAC
  • IPS
  • VPN

Explanation: The term VPN describes a virtual network that uses encryption to protect data when traveling across Internet media.

12. What mechanism can organizations use to prevent accidental changes by authorized users?

  • SHA-1
  • backups
  • version control
  • hashing
  • encryption

Explanation: Version control ensures that two users cannot update the same object.

13. What is a method of sending information from one device to another using removable media?

  • wired
  • infrared
  • LAN
  • packet
  • wireless
  • sneaker net

Explanation: Sneaker net refers to hand delivering the removable data.

14. What are the three foundational principles of the cybersecurity domain? (Choose three.)

  • policy
  • integrity
  • availability
  • confidentiality
  • security
  • encryption

Explanation: Three foundational security principles are confidentiality, integrity and availability.

15. Which two methods help to ensure data integrity? (Choose two.)

  • data consistency checks
  • privacy
  • hashing
  • availability
  • authorization
  • repudiation

Explanation: Data integrity systems include one of the two data integrity methods.

16. What three tasks are accomplished by a comprehensive security policy? (Choose three.)

  • useful for management
  • defines legal consequences of violations
  • is not legally binding
  • gives security staff the backing of management
  • vagueness
  • sets rules for expected behavior

Explanation: The security policy of an organization accomplishes several tasks:

  • It demonstrates the commitment to security by an organization.
  • It sets the rules for expected behavior.
  • It ensures consistency in system operations, and software and hardware acquisition use and maintenance.
  • It defines the legal consequences of violations.
  • It gives security staff the backing of management.

17. What principle prevents the disclosure of information to unauthorized people, resources, and processes?

  • integrity
  • confidentiality
  • nonrepudiation
  • accounting
  • availability

Explanation: The security principle of confidentiality refers to the prevention of the disclosure of information to unauthorized people, resources, and processes.

18. What are the three states of data? (Choose three.)

  • suspended
  • in-cloud
  • at rest
  • in-transit
  • in-process
  • encrypted

Explanation: The protection of the cyber world requires cybersecurity professionals to account for the safeguarding of data in-transit, in-cloud, and at rest.

19. What name is given to any changes to the original data such as users manually modifying data, programs processing and changing data, and equipment failures?

  • deletion
  • modification
  • dissemination
  • corruption
  • backup
  • integrity

Explanation: Modification involves changes to the original data and not complete deletion of the data.

20. What are three access control security services? (Choose three.)

  • access
  • authentication
  • repudiation
  • authorization
  • accounting
  • availability

Explanation: This question refers to AAA authentication, authorization, and accountability.

21. What three methods help to ensure system availability? (Choose three.)

  • system backups
  • system resiliency
  • equipment maintenance
  • fire extinguishers
  • up-to-date operating systems
  • integrity checking

Explanation: Methods used to ensure high availability include system redundancy, system backups, increased system resiliency, equipment maintenance, operating system and software updates and patches, and proactive plans for swift recovery from unforeseen disasters.

Subscribe
Notify of
guest

5 Comments
Inline Feedbacks
View all comments
omer
omer
4 months ago

12. What mechanism can organizations use to prevent accidental changes by authorized users?

  • SHA-1
  • backups
  • version control———
  • hashing
  • encryption
sexydrunkman
sexydrunkman
6 months ago

you forgot to highlight version control

Mark
Mark
1 year ago

What three methods help to ensure system availability? (Choose three.)

up-to-date operating systems
system resiliency
fire extinguishers
equipment maintenance
system backups
integrity checking