100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.6 TrustPilot
logo-home
Exam (elaborations)

Fundamentals of Information Security

Rating
-
Sold
-
Pages
14
Grade
A+
Uploaded on
24-10-2024
Written in
2024/2025

Which type of system is considered absolutely secure? A. A system that is new. B. A system that has been recently patched. C. A system that has been in production for many years. D. A system that is shut off and disconnected from all networks. - answer-D. A system that is shut off and disconnected from all networks. Which concept of the CIA Triad is associated with reliability? A. Availability B. Confidentiality C. Authentication D. Integrity - answer-D. Integrity (it ensures data has not been tampered with & its correct, authentic, & reliable. A malicious actor has breached the firewall with a reverse shell. Which side of the CIA triad is most affected? A. Availability B. Confidentially C. Authentication D. Integrity - answer-B. Confidentiality A user changes a number in a dataset with a typo. Which side of the CIA Triad is most affected? A. Availability B. Confidentiality C. Authentication D. Integrity - answer-D. Integrity What is an example of identification? A. Fingerprint B. Mothers Maiden Name C. Captcha Tests D. Username - answer-D. Username What are 3 forms of authentication? A. Four-digit PIN number B. Text of 6-digit number to phone C. Phone number D. Fingerprint E. Account Number F. Username - answer-A. Four-digit PIN number B. Text of 6-digit number to phone D. Fingerprint What is an example of identification? A. Voice Pattern B. Write access C. Email Address D. Mother's Maiden Name - answer-C. Email Address What is an example of authentication? A. Username B. Write Access C. Email Address D. Mother's Maiden Name - answer-D. Mother's Maiden Name What is the final step in allowing access to resources? A. Identification B. Authentication C. Authorization D. Accountability - answer-C. Authorization Which example demonstrates access control? A. Turning the key in the ignition of a car. B. Locking and unlocking the doors of your house. C. Selecting a pin for a new account. D. Changing a bank account password. - answer-B. Locking and unlocking the doors of your house. Which type of access control model is a CAPTCHA an example of? A. Role-based B. Mandatory-based C. Discretionary-based D. Attribute-based - answer-D. Attribute-based What is a sandbox? A. A tool only used in Java B. An isolated environment that protects a set of resources. C. Part of VPN connection D. A virtual location to share digital information - answer-B. An isolated environment that protects a set of resources. A tornado destroyed a data center. Eh I hidden of the CIA triad is most affected? A. Authenticity B. Availability C. Utility D. Integrity - answer-B. Availability What element of the parkerian hexad concerned with usefulness? A. Integrity B. Confidentiality C. Utility D. Availability - answer-C. Utility Which attribute of the parkerian hexad allows for proper attribution of the owner of a dataset? A. Possession B. Availability C. Authenticity D. Integrity - answer-C. Authenticity Which type of attack category is an attack against confidentiality? A. Interception B. Modification C. Fabrication D. Interruption - answer-A. Interception Which 2 attributes are included in the concept of risk? Choose 2 answers A. Threats B. Frequency C. Vulnerabilities D. Impacts - answer-A. Threats C. Vulnerabilities Which phase of the incident response process includes putting the system back better than the original state? A. Post-incident activity. B. Containment. C. Recovery. D. Detection and Analysis - answer-C. Recovery Which concept refers to adding layers of security to our networks? A. Administrative control depth B. Defense in depth. C. Physical control depth. D. Logical control depth. - answer-B. Defense in depth. Which combination of factors demonstrates multifactor authentication? A. Fingerprint and voice print B. Password and Pin. C. Password and fingerprint. D. Voice print and weight. - answer-C. Password and fingerprint. What is the name of the process where the client authenticates the server in the server authenticates the client? A. Token based authentication. B. Mutual authentication. C. Two factor authentication. D. Multi factor authentication. - answer-C. Mutual authentication. What is an example of identification? A. Text to Cell Phone. B. Employee number C. Update access. D. Fingerprint. - answer-B. Employee number What is an example of authentication? A. Username. B. First car. C. Read only. D. Pin - answer-D. Pin Which factors demonstrate multifactor authentication? A. Vein patterns and iris scan. B. User name and email address. C. Childhood pet and mothers maiden name. D. Mothers maiden name and voice print. - answer-D. Mothers, maiden name, and voice print What is an objective for performing an audit? A. To ensure a company can respond effectively to a disaster. B. To ensure compliance and detect misuse. C. To ensure potential risks are identified and analyzed. D. To ensure proper access is granted to resources. - answer-B. To ensure compliance and detect misuse. What are two common values for a net work access control list (ACL)? Choose two answers.

Show more Read less
Institution
Fundamentals Of Information Security
Course
Fundamentals of Information Security









Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Institution
Fundamentals of Information Security
Course
Fundamentals of Information Security

Document information

Uploaded on
October 24, 2024
Number of pages
14
Written in
2024/2025
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

FUNDAMENTALS
OF
INFORMATION
SECURITY
[Document subtitle]

, Fundamentals of Information Security
Which type of system is considered absolutely secure?

A. A system that is new.
B. A system that has been recently patched.
C. A system that has been in production for many years.
D. A system that is shut off and disconnected from all networks. - answer-D. A system that is shut off and
disconnected from all networks.

Which concept of the CIA Triad is associated with reliability?

A. Availability
B. Confidentiality
C. Authentication
D. Integrity - answer-D. Integrity (it ensures data has not been tampered with & its correct, authentic, &
reliable.

A malicious actor has breached the firewall with a reverse shell. Which side of the CIA triad is most
affected?

A. Availability
B. Confidentially
C. Authentication
D. Integrity - answer-B. Confidentiality

A user changes a number in a dataset with a typo. Which side of the CIA Triad is most affected?

A. Availability
B. Confidentiality
C. Authentication
D. Integrity - answer-D. Integrity

What is an example of identification?

A. Fingerprint
B. Mothers Maiden Name
C. Captcha Tests
D. Username - answer-D. Username

What are 3 forms of authentication?

A. Four-digit PIN number
B. Text of 6-digit number to phone
C. Phone number
D. Fingerprint
E. Account Number

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
TOPDOCTOR Abacus College, Oxford
View profile
Follow You need to be logged in order to follow users or courses
Sold
10
Member since
2 year
Number of followers
5
Documents
3396
Last sold
3 months ago
TOPGRADER!!

Looking for relevant and updated study material to help you ace your exams? TOPTIERGRADES has your back!!! I have essential exams, test-banks, study bites, assignments all graded A+, Have Complete solutions, and are updated regularly. Please feel free to message me if you are looking for a specific test bank that is not listed on my profile or want a test bank or exam sent to you directly as google doc link. In the event that any of the materials have an issue, please let me know and I\'ll do my best to resolve it or provide an alternative. Thank You & All The Very BEST!!!!!

Read more Read less
5.0

1 reviews

5
1
4
0
3
0
2
0
1
0

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions