QUESTIONS WITH ANSWERS |\ |\
At a small company, an employee makes an unauthorized data alteration.
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
Which component of the CIA triad has been compromised? - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
ANSWERS ✔✔Integrity |\
An organization plans to encrypt data in transit on a network. Which
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
aspect of data is the organization attempting to protect? - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
ANSWERS ✔✔Integrity |\
Which aspect of the CIA triad is violated by an unauthorized database roll
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
back or undo? - CORRECT ANSWERS ✔✔Integrity
|\ |\ |\ |\ |\ |\
A company's website has suffered several denial of service (DoS) attacks
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
and wishes to thwart future attacks. Which security principle is the
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
company addressing? - CORRECT ANSWERS ✔✔Availability
|\ |\ |\ |\ |\
An organization has a requirement that all database servers and file
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
servers be configured to maintain operations in the presence of a failure.
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
Which principle of the CIA triad is this requirement implementing? -
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
CORRECT ANSWERS ✔✔Availability |\ |\
Which tool can be used to map devices on a network, along with their
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
operating system types and versions? - CORRECT ANSWERS ✔✔Port
|\ |\ |\ |\ |\ |\ |\ |\ |\
scanner
, Which web attack is a server-side attack? - CORRECT ANSWERS ✔✔SQL
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
injection
A new start-up company has started working on a social networking
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
website. The company has moved all its source code to a cloud provider
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
and wants to protect this source code from unauthorized access. Which
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
cyber defense concept should the start-up company use to maintain the
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
confidentiality of its source code? - CORRECT ANSWERS ✔✔File |\ |\ |\ |\ |\ |\ |\ |\ |\
encryption
A company has an annual audit of installed software and data storage
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
systems. During the audit, the auditor asks how the company's most
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
critical data is used. This determination helps the auditor ensure that the
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
proper defense mechanisms are in place to protect critical data. Which
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
principle of the Parkerian hexad is the auditor addressing? - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
ANSWERS ✔✔Utility |\
Which web attack is possible due to a lack of input validation? - CORRECT
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
ANSWERS ✔✔SQL injection
|\ |\ |\
Which cybersecurity term is defined as the potential for an attack on a
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
resource? - CORRECT ANSWERS ✔✔Threat |\ |\ |\ |\
An organization employs a VPN to safeguard its information. Which
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\
security principle is protected by a VPN? - CORRECT ANSWERS ✔✔Data in
|\ |\ |\ |\ |\ |\ |\ |\ |\ |\ |\
motion
|\