Cybersecurity Essentials 1.1 Chapter 2 Quiz Answers Full Questions
Chapter 2: The Cybersecurity Cube
1. What is identified by the first dimension of the cybersecurity cube?
- tools
- knowledge
- goals
- safeguards
- rules
2. What are three types of sensitive information? (Choose three.)
- declassified
- public
- PII
- business
- published
- classified
3. What are two common hash functions? (Choose two.)
- Blowfish
- SHA
- MD5
- ECC
- RC4
- RSA
4. What service determines which resources a user can access along with the operations that a user can perform?
- authentication
- biometric
- authorization
- accounting
- token
5. What type of cybersecurity laws protect you from an organization that might want to share your sensitive data?
- authentication
- confidentiality
- nonrepudiation
- privacy
- integrity
6. What three design principles help to ensure high availability? (Choose three.)
- detect failures as they occur
- eliminate single points of failure
- check for data consistency
- use encryption
- provide for reliable crossover
- ensure confidentiality
7. For the purpose of authentication, what three methods are used to verify identity? (Choose three.)
- where you are
- something you are
- something you know
- something you do
- something you have
8. What two methods help to ensure system availability? (Choose two.)
- integrity checking
- system backups
- up-to-date operating systems
- system resiliency
- fire extinguishers
- equipment maintenance
9. What name is given to a storage device connected to a network?
- NAS
- SAN
- RAID
- Cloud
- DAS
10. What are two methods that ensure confidentiality? (Choose two.)
- authorization
- availability
- nonrepudiation
- authentication
- integrity
- encryption
11. What is a secure virtual network called that uses the public network?
- MPLS
- IDS
- Firewall
- NAC
- IPS
- VPN
12. What mechanism can organizations use to prevent accidental changes by authorized users?
- SHA-1
- backups
- version control
- hashing
- encryption
13. What is a method of sending information from one device to another using removable media?
- wired
- infrared
- LAN
- packet
- wireless
- sneaker net
14. What are the three foundational principles of the cybersecurity domain? (Choose three.)
- policy
- integrity
- availability
- confidentiality
- security
- encryption
15. Which two methods help to ensure data integrity? (Choose two.)
- data consistency checks
- privacy
- hashing
- availability
- authorization
- repudiation
16. What three tasks are accomplished by a comprehensive security policy? (Choose three.)
- useful for management
- defines legal consequences of violations
- is not legally binding
- gives security staff the backing of management
- vagueness
- sets rules for expected behavior
17. What principle prevents the disclosure of information to unauthorized people, resources, and processes?
- integrity
- confidentiality
- nonrepudiation
- accounting
- availability
18. What are the three states of data? (Choose three.)
- suspended
- in-cloud
- at rest
- in-transit
- in-process
- encrypted
19. What name is given to any changes to the original data such as users manually modifying data, programs processing and changing data, and equipment failures?
- deletion
- modification
- dissemination
- corruption
- backup
- integrity
20. What are three access control security services? (Choose three.)
- access
- authentication
- repudiation
- authorization
- accounting
- availability
21. What three methods help to ensure system availability? (Choose three.)
- system backups
- system resiliency
- equipment maintenance
- fire extinguishers
- up-to-date operating systems
- integrity checking
12. What mechanism can organizations use to prevent accidental changes by authorized users?
Fixed. Thank you.
you forgot to highlight version control
What three methods help to ensure system availability? (Choose three.)
up-to-date operating systems
system resiliency
fire extinguishers
equipment maintenance
system backups
integrity checking
I added. Thank you.