No student devices needed. Know more
14 questions
Identify the three principles of enforcing cybersecurity. (3 answers) (2.0.1.1)
Confidentiality
Information
Integrity
Availability
Which principle of cybersecurity prevents prevents the disclosure of information to unauthorized people, resources, or processes. (2.1.1.1)
Confidentiality
Transmission
Integrity
Availability
Which principle of cybersecurity refers to the accuracy, consistency, and trustworthiness of data. (2.1.1.1)
Confidentiality
Transmission
Integrity
Availability
Which principle of cybersecurity information is accessible by authorized users when needed. (2.1.1.1)
Confidentiality
Transmission
Integrity
Availability
Identify the three possible states of data in cyberspace that requires protection. (3 answers) (2.1.1.2)
Data in transit
Data at rest or in storage
Data to be shared
Data in process
Identify the best way for an organization to comply with the growing number of privacy related laws. (2.1.1.3)
Security
Technology
Policies
Integrity
Hashing, data validation checks, data consistency checks, and access controls are used to ensure....(2.2.2.3)
data transmission
data availability
data security
data integrity
The integrity check that converts each piece of information to a value and sum the total is referred to as a ....(2.2.2.3)
Hash function
Checksum
file permissions
user access controls
System redundancy, system backups, increased system resiliency, equipment maintenance, up-to-date operating systems and software, and plans in place to recover quickly from unforeseen disasters are methods to ensure .....(2.2.2.3)
Confidentiality
Integrity
Availability
Protection
Which of the following is NOT an option for storing data? (2.3.1)
Direct-attached storage (DAS)
Redundant array of independent disks (RAID)
Virtual Private Network(VPN)
Network attached storage (NAS)
Storage area network (SAN)
A network-based technology that uses the public network (i.e., the Internet) and secures the data through encryption of packets. (2.4.1.3)
Network access control (NAC)
Virtual Private Network (VPN)
Wireless access point security
Host-based intrusion detection systems
A cloud-based technology safeguard that allows users to gain access to application software and databases. (2.4.1.4)
IT as a Service (ITaaS)
Platform as a Service (PaaS)
Infrastructure as a Service (IaaS)
Software as a Service (SaaS)
A set of security objectives for a company that includes rules of behavior for users and administrators and specifies system requirements is known as a .....(2.4.3.1)
Protection mechanism
Security policy
Security precaution
CIA Triad
The concepts of AAA involve three security services to provide the primary framework to prevent unauthorized access to a computer, network, database, or other data resources.
Accessibility, Authorization, Attitude
Authentication, Authorization and Accounting
Area Control, Accessibility, Accounting
Attitude, Accessibility, Accounting
Explore all questions with a free account