Cybersecurity Essentials Module 2 Quiz Answers
Module 2: Cybersecurity P3: Principles, Practices and Processes Quiz Question Answers
1. What name is given to any changes made to original data, such as data being modified manually? (Select two answers)
- Backup
- Deletion
- Corruption
- Dissemination
- Integrity
- Modification
2. Which of the following methods help to ensure data integrity? (Select two answers)
- Hashing
- Data consistency checks
- Authorization
- Repudiation
- Availability
- Privacy
3. What name is given to a storage device connected to a network?
- RAID
- DAS
- NAS
- SAN
- Cloud
4. Which of the following methods help to ensure system availability? (Select two answers)
- Updating operating systems
- Equipment maintenance
- System resiliency
- Fire extinguishers
- Integrity checking
- System backups
5. What is an advantage of using a hashing function?
- It has a variable length output
- Two different files can be created that have the same output
- It is a one-way function and not reversible
- It is not commonly used in security
- It can take only a fixed length message
6. What is the name of the method in which letters are rearranged to create a ciphertext?
- Substitution
- Transposition
- One-time pad
- Enigma
7. Which of these protocols use asymmetric key algorithms? (Select three answers)
- Telnet
- Secure File Transfer Protocol (SFTP)
- Secure Sockets Layer (SSL)
- Advanced Encryption Standard (AES)
- Secure Shell (SSH)
- Pretty Good Privacy (PGP)
8. @Apollo has created a new program and wants to distribute it to everyone in the organization. They want to ensure that when the program is downloaded, it is not changed while in transit. What can @Apollo do to ensure this does not happen?
- Turn off antivirus on all the computers
- Distribute the program on a thumb drive
- Encrypt the program and require a password after it is downloaded
- Install the program on individual computers
- Create a hash of the program file that can be used to verify the integrity of the file after it is downloaded
9. What term is used to describe concealing data in another file such as a graphic, audio or video file?
- Steganography
- Hiding
- Masking
- Obfuscation
10. Which of the following are examples of administrative access controls? (Select three answers)
- Encryption
- Intrusion detection systems (IDS)
- Policies and procedures
- Background checks
- Guard dogs
- Hiring practices