Module 2: Cybersecurity P3: Principles, Practices and Processes Quiz Answers

Cybersecurity Essentials Module 2 Quiz Answers

Module 2: Cybersecurity P3: Principles, Practices and Processes Quiz Question Answers

1. What name is given to any changes made to original data, such as data being modified manually? (Select two answers)

  • Backup
  • Deletion
  • Corruption
  • Dissemination
  • Integrity
  • Modification

2. Which of the following methods help to ensure data integrity? (Select two answers)

  • Hashing
  • Data consistency checks
  • Authorization
  • Repudiation
  • Availability
  • Privacy

Explanation: Data integrity systems include one of the two data integrity methods.

3. What name is given to a storage device connected to a network?

  • RAID
  • DAS
  • NAS
  • SAN
  • Cloud

Explanation: NAS refers to a storage device connected to a network that allows storage and retrieval of data from a centralized location by authorized network users.

4. Which of the following methods help to ensure system availability? (Select two answers)

  • Updating operating systems
  • Equipment maintenance
  • System resiliency
  • Fire extinguishers
  • Integrity checking
  • System backups

5. What is an advantage of using a hashing function?

  • It has a variable length output
  • Two different files can be created that have the same output
  • It is a one-way function and not reversible
  • It is not commonly used in security
  • It can take only a fixed length message

Explanation: Understanding the properties of a hash function shows its applicability such as one-way function, arbitrary input length, and fixed output.

6. What is the name of the method in which letters are rearranged to create a ciphertext?

  • Substitution
  • Transposition
  • One-time pad
  • Enigma

Explanation: Ciphertext can be created by using the following:
Transposition – letters are rearranged
Substitution – letters are replaced
One-time pad – plaintext combined with a secret key creates a new character, which then combines with the plaintext to produce ciphertext

7. Which of these protocols use asymmetric key algorithms? (Select three answers)

  • Telnet
  • Secure File Transfer Protocol (SFTP)
  • Secure Sockets Layer (SSL)
  • Advanced Encryption Standard (AES)
  • Secure Shell (SSH)
  • Pretty Good Privacy (PGP)

Explanation: Four protocols use asymmetric key algorithms:
Internet Key Exchange (IKE)
Secure Socket Layer (SSL)
Secure Shell (SSH)
Pretty Good Privacy (PGP)

8. @Apollo has created a new program and wants to distribute it to everyone in the organization. They want to ensure that when the program is downloaded, it is not changed while in transit. What can @Apollo do to ensure this does not happen?

  • Turn off antivirus on all the computers
  • Distribute the program on a thumb drive
  • Encrypt the program and require a password after it is downloaded
  • Install the program on individual computers
  • Create a hash of the program file that can be used to verify the integrity of the file after it is downloaded

Explanation: Hashing is a method to ensure integrity and ensures that the data is not changed.

9. What term is used to describe concealing data in another file such as a graphic, audio or video file?

  • Steganography
  • Hiding
  • Masking
  • Obfuscation

Explanation: Steganography conceals data in a file such as a graphic, audio, or other text file and is used to prevent extra attention to the encrypted data because the data is not easily viewed.

10. Which of the following are examples of administrative access controls? (Select three answers)

  • Encryption
  • Intrusion detection systems (IDS)
  • Policies and procedures
  • Background checks
  • Guard dogs
  • Hiring practices

Explanation: Administrative access controls are defined by organizations to implement and enforce all aspects of controlling unauthorized access and include the following:
Policies
Procedures
Hiring practices
Background checks
Data classification
Security training
Reviews

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x