Chapter 2 Quiz
Due No due date Points 40 Questions 20 Time Limit None
Allowed Attempts Unlimited
Instructions
This quiz covers the content in Cybersecurity Essentials 1.1 Chapter 2. It is designed to provide an additional
opportunity to practice the skills and knowledge presented in the chapter and to help prepare for the final quiz. You
will be allowed multiple attempts and the grade does not appear in the gradebook.
There are multiple task types that may be available in this quiz.
NOTE: Quizzes allow for partial credit scoring on all item types to foster learning. Points on quizzes can also be
deducted for answering incorrectly.
Form 32910
Take the Quiz Again
Submitted Jun 25 at 7:10pm
Question 1 2 / 2 pts
What principle prevents the disclosure of information to unauthorized people,
resources, and processes?
nonrepudiation
Correct!
confidentiality
integrity
accounting
availability
Refer to curriculum topic: 2.2.1
The security principle of confidentiality refers to the prevention of the
disclosure of information to unauthorized people, resources, and processes.
Question 2 2 / 2 pts
What are the three foundational principles of the cybersecurity domain? (Choose
three.)
encryption
Correct! confidentiality
Correct! integrity
security
Correct! availability
policy
Refer to curriculum topic: 2.1.1
Three foundational security principles are confidentiality, integrity and
availability.
Question 3 2 / 2 pts
What name is given to any changes to the original data such as users manually
modifying data, programs processing and changing data, and equipment failures?
backup
deletion
Correct!
modification
integrity
dissemination
corruption
Refer to curriculum topic: 2.3.3
Modification involves changes to the original data and not complete deletion
of the data.
Question 4 2 / 2 pts
What are three types of sensitive information? (Choose three.)
Correct! classified
Correct! business
public
declassified
Correct! PII
published
Refer to curriculum topic: 2.2.1
Sensitive information is information that would otherwise cause harm to a
company or individual if publicly disclosed.
Question 5 2 / 2 pts
What are three access control security services? (Choose three.)
availability
access
Correct! accounting
Correct! authentication
repudiation
Correct! authorization
Refer to curriculum topic: 2.2.1
This question refers to AAA authentication, authorization, and accountability.
Question 6 2 / 2 pts
What is a method of sending information from one device to another using
removable media?
LAN
packet
wireless
wired
infrared
Correct!
sneaker net
Refer to curriculum topic: 2.3.2
Sneaker net refers to hand delivering the removable data.
Question 7 2 / 2 pts
What type of cybersecurity laws protect you from an organization that might want to
share your sensitive data?
confidentiality
Correct!
privacy
integrity
nonrepudiation
authentication
Refer to curriculum topic: 2.2.1
Privacy laws control appropriate use of data and access to data.
Question 8 2 / 2 pts
What are the three states of data? (Choose three.)
in-cloud
encrypted
Correct! in-transit
Correct! at rest
Correct! in-process
suspended
Refer to curriculum topic: 2.3.1
The protection of the cyber world requires cybersecurity professionals to
account for the safeguarding of data in-transit, in-cloud, and at rest.
Question 9 2 / 2 pts
What two methods help to ensure system availability? (Choose two.)
integrity checking
fire extinguishers
Correct! equipment maintenance
system backups
system resiliency
Correct! up-to-date operating systems
Refer to curriculum topic: 2.2.3
Question 10 2 / 2 pts
Which two methods help to ensure data integrity? (Choose two.)
Correct! hashing
authorization
Correct! data consistency checks
availability
repudiation
privacy
Refer to curriculum topic: 2.2.2
Data integrity systems include one of the two data integrity methods.
Question 11 2 / 2 pts
What three design principles help to ensure high availability? (Choose three.)
ensure confidentiality
use encryption
Correct! eliminate single points of failure
Correct! provide for reliable crossover
Correct! detect failures as they occur
check for data consistency
Refer to curriculum topic: 2.2.3
High availability systems typically include these three design principles.
Question 12 2 / 2 pts
What are two methods that ensure confidentiality? (Choose two.)
Correct! encryption
integrity
authorization
Correct! authentication
nonrepudiation
availability
Refer to curriculum topic: 2.2.1
Confidentiality means viewing of information only for those who need to
know. This can be accomplished by encrypting data and authenticating users
who request access.
Question 13 2 / 2 pts
What is identified by the first dimension of the cybersecurity cube?
tools
rules
Correct!
goals
safeguards
knowledge
Refer to curriculum topic: 2.1.1
The first dimension of the cybersecurity sorcery cube identifies the goals or
security principles required to protect the cyber world.
Question 14 2 / 2 pts
What service determines which resources a user can access along with the
operations that a user can perform?
authentication
token
Correct!
authorization
accounting
biometric
Refer to curriculum topic: 2.2.1
Authorization determines whether a user has certain access privileges.
Question 15 2 / 2 pts
What mechanism can organizations use to prevent accidental changes by
authorized users?
encryption
Correct!
version control
hashing
SHA-1
backups
Refer to curriculum topic: 2.2.2
Version control ensures that two users cannot update the same object.
Question 16 2 / 2 pts
What name is given to a storage device connected to a network?
SAN
Cloud
DAS
Correct!
NAS
RAID
Refer to curriculum topic: 2.3.1
NAS refers to a storage device connected to a network that allows storage
and retrieval of data from a centralized location by authorized network users.
Question 17 2 / 2 pts
What are two common hash functions? (Choose two.)
RC4
ECC
Correct! MD5
RSA
Blowfish
Correct! SHA
Refer to curriculum topic: 2.2.2
SHA and MD5 use use complex mathematical algorithms to compute hash
values.
Question 18 2 / 2 pts
What three tasks are accomplished by a comprehensive security policy? (Choose
three.)
vagueness
is not legally binding
Correct! sets rules for expected behavior
Correct! gives security staff the backing of management
useful for management
Correct! defines legal consequences of violations
Refer to curriculum topic: 2.4.3
Policy sets the establishment of rules and guidelines for the business.
Question 19 2 / 2 pts
For the purpose of authentication, what three methods are used to verify identity?
(Choose three.)
something you do
Correct! something you are
Correct! something you have
Correct! something you know
where you are
Refer to curriculum topic: 2.2.1
The forms of authentication are something you know, have, or are.
Question 20 2 / 2 pts
What is a secure virtual network called that uses the public network?
MPLS
Correct!
VPN
IPS
NAC
Firewall
IDS
Refer to curriculum topic: 2.4.1
The term VPN describes a virtual network that uses encryption to protect
data when traveling across Internet media.