SY0-701 Pre-Assessment Quiz
What are the 2 essential security ideas?
A. Confidentiality, integrity, and availability (CIA)
b. Authentication, authorization, and accounting (AAA)
c. Records safety (IS)
d. Records guarantee (IA)
a. Confidentiality, integrity, and availability (CIA)
b. Authentication, authorization, and accounting (AAA)
Explanation: Three primary security protections ought to be extended over the information:
confidentiality, integrity, and availability (CIA). The 2d basic protection principle,
authentication, authorization, and accounting (AAA; once in a while known as "triple-A"),
involves controlling get right of entry to to information.
What are three hardware vulnerabilities that could cause a a success assault?
A. Trouble patching firmware
b. Legacy structures
c. Quit-of-life hardware
d. Legacy firmware
b. Legacy structures
c. End-of-lifestyles hardware
d. Legacy firmware
Explanation: Several hardware vulnerabilities can lead to a successful assault. These
encompass problem patching firmware, legacy platforms, and give up-of-existence
hardware.
What are a few forms of Social Engineering Attacks? Select three.
A. Phishing
b. Redirection
c. Impersonation
d. Watering attacks
a. Phishing
b. Redirection
c. Impersonation
, Explanation: There are several styles of social engineering attacks. These consist of
phishing, impersonation, redirection, incorrect information and disinformation, watering
hollow attacks, and statistics reconnaissance.
John wants to observe two physical controls to prevent vital records from escaping. What
can he apply?
A. Faraday cage
b. Included cable distribution device
c. Microwave cage
d. Mild-emitting system
a. Faraday cage
b. Included cable distribution gadget
Explanation: Another approach of bodily security applies to stopping vital facts from
escaping (leakage). Two physical controls can be implemented. These consist of a Faraday
cage and protected cable distribution systems.
When using cryptography, the technique of converting the authentic text into a scrambled
message is thought as_____________.
A. Encryption
b. Decryption
c. Steganography
d. Cipher
a. Encryption
Explanation: When the use of cryptography, the technique of converting the authentic text
right into a scrambled message is referred to as encryption. The reverse technique is
decryption or changing the message back to its unique form.
Amie desires to ensure her information is doubly protected. What processes can she use
collectively?
A. Steganography and encryption
b. Decryption and encryption
c. Steganography and Decryption
d. Records masking and Steganography
a. Steganography and encryption
Explanation: Steganography is every now and then used together with encryption so that the
facts is doubly included. First encrypting the data and then hiding it calls for a person in
search of the data to first find the information and then decrypt it.