Test guide questions with 100%
complete solution
Relational - ANSare very widely implemented and designed to support ACID
transactions.
Key-value - ANSare optimized to store and retrieve large volumes of data. It offers
high-performance under heavy workloads.
In-memory - ANSoffer real-time access to data and access to applications with
microsecond latency.
Document - ANSenable developers to build applications quickly by storing data in a
semi-structured manner.
Wide-column - ANSare a type of NoSQL database.
Graph - ANSare designed to support applications that query millions of relationships
between highly connected datasets, such as social media platforms.
Time series - ANSare focused on supporting applications that analyze data that evolves
and changes over time and is best represented using time intervals such as in an
industrial setting.
Ledger - ANSenable a trusted and verifiable authority to support banking transactions
and systems of record.
Fundamentals of Information Security
Pre-Assessment Test - ANS
A. Threat - ANSWhich cybersecurity term is defined as the potential for an attack on a
resource?
A.Threat
B. Vulnerability
C. Risk
D. Impact
, A. Port scanner - ANSWhich tool can be used to map devices on a network, along with
their operating system types and versions?
A. Port scanner
B. Stateful firewall
C. Packet filter
D. Packet sniffer
A. SQL injection - ANSWhich web attack is a server-side attack?
A. SQL injection
B. Cross-site scripting
C. Cross-site request forgery
D. Clickjacking
A. Data in motion - ANSAn organization employs a VPN to safeguard its information.
Which security principle is protected by a VPN?
A. Data in motion
B. Data in storage
C. Data at rest
D. Data in use
A. Interruption - ANSA malicious hacker was successful in a denial of service (DoS)
attack against an institution's mail server. Fortunately, no data was lost or altered while
the server was offline. Which type of attack is this?
A. Interruption
B. Interception
C. Modification
D. Fabrication
A. Availability - ANSA company has had several successful denial of service (DoS)
attacks on its email server. Which security principle is being attacked?
A. Availability
B. Confidentiality
C. Integrity
D. Possession
A. File encryption - ANSA new start-up company has started working on a social
networking website. The company has moved all its source code to a cloud provider and
wants to protect this source code from unauthorized access. Which cyber defense