0% found this document useful (0 votes)
694 views11 pages

Cybersecurity Essentials Chapter 2 Quiz

This quiz covers content from Chapter 2 of the Cybersecurity Essentials curriculum. It contains 20 multiple choice questions testing knowledge of security principles like confidentiality, integrity, and availability. It allows unlimited attempts and the grade does not impact the course gradebook.

Uploaded by

Yoga Saputra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
694 views11 pages

Cybersecurity Essentials Chapter 2 Quiz

This quiz covers content from Chapter 2 of the Cybersecurity Essentials curriculum. It contains 20 multiple choice questions testing knowledge of security principles like confidentiality, integrity, and availability. It allows unlimited attempts and the grade does not impact the course gradebook.

Uploaded by

Yoga Saputra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Chapter 2 Quiz

Due No due date Points 40 Questions 20 Time Limit None


Allowed Attempts Unlimited

Instructions
This quiz covers the content in Cybersecurity Essentials 1.1 Chapter 2. It is designed to provide an additional
opportunity to practice the skills and knowledge presented in the chapter and to help prepare for the final quiz. You
will be allowed multiple attempts and the grade does not appear in the gradebook.
There are multiple task types that may be available in this quiz.
NOTE: Quizzes allow for partial credit scoring on all item types to foster learning. Points on quizzes can also be
deducted for answering incorrectly.

Form 32910

Take the Quiz Again

Submitted Jun 25 at 7:10pm

Question 1 2 / 2 pts

What principle prevents the disclosure of information to unauthorized people,


resources, and processes?

nonrepudiation

Correct!
confidentiality

integrity

accounting

availability

Refer to curriculum topic: 2.2.1


The security principle of confidentiality refers to the prevention of the
disclosure of information to unauthorized people, resources, and processes.
Question 2 2 / 2 pts

What are the three foundational principles of the cybersecurity domain? (Choose
three.)

encryption

Correct!  confidentiality

Correct!  integrity

security

Correct!  availability

policy

Refer to curriculum topic: 2.1.1


Three foundational security principles are confidentiality, integrity and
availability.

Question 3 2 / 2 pts

What name is given to any changes to the original data such as users manually
modifying data, programs processing and changing data, and equipment failures?

backup

deletion

Correct!
modification

integrity

dissemination

corruption
Refer to curriculum topic: 2.3.3
Modification involves changes to the original data and not complete deletion
of the data.

Question 4 2 / 2 pts

What are three types of sensitive information? (Choose three.)

Correct!  classified

Correct!  business

public

declassified

Correct!  PII

published

Refer to curriculum topic: 2.2.1


Sensitive information is information that would otherwise cause harm to a
company or individual if publicly disclosed.

Question 5 2 / 2 pts

What are three access control security services? (Choose three.)

availability

access

Correct!  accounting

Correct!  authentication

repudiation
Correct!  authorization

Refer to curriculum topic: 2.2.1


This question refers to AAA authentication, authorization, and accountability.

Question 6 2 / 2 pts

What is a method of sending information from one device to another using


removable media?

LAN

packet

wireless

wired

infrared

Correct!
sneaker net

Refer to curriculum topic: 2.3.2


Sneaker net refers to hand delivering the removable data.

Question 7 2 / 2 pts

What type of cybersecurity laws protect you from an organization that might want to
share your sensitive data?

confidentiality

Correct!
privacy

integrity

nonrepudiation
authentication

Refer to curriculum topic: 2.2.1


Privacy laws control appropriate use of data and access to data.

Question 8 2 / 2 pts

What are the three states of data? (Choose three.)

in-cloud

encrypted

Correct!  in-transit

Correct!  at rest

Correct!  in-process

suspended

Refer to curriculum topic: 2.3.1


The protection of the cyber world requires cybersecurity professionals to
account for the safeguarding of data in-transit, in-cloud, and at rest.

Question 9 2 / 2 pts

What two methods help to ensure system availability? (Choose two.)

integrity checking

fire extinguishers

Correct!  equipment maintenance

system backups
system resiliency

Correct!  up-to-date operating systems

Refer to curriculum topic: 2.2.3

Question 10 2 / 2 pts

Which two methods help to ensure data integrity? (Choose two.)

Correct!  hashing

authorization

Correct!  data consistency checks

availability

repudiation

privacy

Refer to curriculum topic: 2.2.2


Data integrity systems include one of the two data integrity methods.

Question 11 2 / 2 pts

What three design principles help to ensure high availability? (Choose three.)

ensure confidentiality

use encryption

Correct!  eliminate single points of failure

Correct!  provide for reliable crossover


Correct!  detect failures as they occur

check for data consistency

Refer to curriculum topic: 2.2.3


High availability systems typically include these three design principles.

Question 12 2 / 2 pts

What are two methods that ensure confidentiality? (Choose two.)

Correct!  encryption

integrity

authorization

Correct!  authentication

nonrepudiation

availability

Refer to curriculum topic: 2.2.1


Confidentiality means viewing of information only for those who need to
know. This can be accomplished by encrypting data and authenticating users
who request access.

Question 13 2 / 2 pts

What is identified by the first dimension of the cybersecurity cube?

tools

rules

Correct!
goals
safeguards

knowledge

Refer to curriculum topic: 2.1.1


The first dimension of the cybersecurity sorcery cube identifies the goals or
security principles required to protect the cyber world.

Question 14 2 / 2 pts

What service determines which resources a user can access along with the
operations that a user can perform?

authentication

token

Correct!
authorization

accounting

biometric

Refer to curriculum topic: 2.2.1


Authorization determines whether a user has certain access privileges.

Question 15 2 / 2 pts

What mechanism can organizations use to prevent accidental changes by


authorized users?

encryption

Correct!
version control

hashing
SHA-1

backups

Refer to curriculum topic: 2.2.2


Version control ensures that two users cannot update the same object.

Question 16 2 / 2 pts

What name is given to a storage device connected to a network?

SAN

Cloud

DAS

Correct!
NAS

RAID

Refer to curriculum topic: 2.3.1


NAS refers to a storage device connected to a network that allows storage
and retrieval of data from a centralized location by authorized network users.

Question 17 2 / 2 pts

What are two common hash functions? (Choose two.)

RC4

ECC

Correct!  MD5

RSA
Blowfish

Correct!  SHA

Refer to curriculum topic: 2.2.2


SHA and MD5 use use complex mathematical algorithms to compute hash
values.

Question 18 2 / 2 pts

What three tasks are accomplished by a comprehensive security policy? (Choose


three.)

vagueness

is not legally binding

Correct!  sets rules for expected behavior

Correct!  gives security staff the backing of management

useful for management

Correct!  defines legal consequences of violations

Refer to curriculum topic: 2.4.3


Policy sets the establishment of rules and guidelines for the business.

Question 19 2 / 2 pts

For the purpose of authentication, what three methods are used to verify identity?
(Choose three.)

something you do

Correct!  something you are


Correct!  something you have

Correct!  something you know

where you are

Refer to curriculum topic: 2.2.1


The forms of authentication are something you know, have, or are.

Question 20 2 / 2 pts

What is a secure virtual network called that uses the public network?

MPLS

Correct!
VPN

IPS

NAC

Firewall

IDS

Refer to curriculum topic: 2.4.1


The term VPN describes a virtual network that uses encryption to protect
data when traveling across Internet media.

You might also like