WGU Course C836 - Fundamentals Of
Information Security Quizlet By Brian
Macfarlane Questions With Correct Answers.
Which gcybersecurity gterm gis gdefined gas gthe gpotential gfor gan gattack gon ga gresource?
A gImpact
B gVulnerability
C gRisk
D gThreat g- g g g gcorrect ganswer.D
Which gsecurity gtype gdeliberately gexposes ga gsystem's gvulnerabilities gor gresources gto gan gattacker?
A gIntrusion gdetection
B gFirewalls
C gHoneypots
D gIntrusion gprevention g- g g g gcorrect ganswer.C
Which gtool gcan gbe gused gto gmap gdevices gon ga gnetwork, galong gwith gtheir goperating gsystem gtypes gand
gversions?
A gPacket gsniffer
B gPacket gfilter
C gPort gscanner
D gStateful gfirewall g- g g g gcorrect ganswer.C
,Which gweb gattack gis ga gserver-side gattack?
A gClickjacking
B gCross-site gscripting
C gSQL ginjection
D gCross-site grequest gforgery g- g g g gcorrect ganswer.C
An gorganization gemploys ga gVPN gto gsafeguard gits ginformation. g
Which gsecurity gprinciple gis gprotected gby ga gVPN?
A gData gin gmotion
B gData gat grest
C gData gin guse
D gData gin gstorage g- g g g gcorrect ganswer.A
A gmalicious ghacker gwas gsuccessful gin ga gdenial gof gservice g(DoS) gattack gagainst gan ginstitution's gmail
gserver. gFortunately, gno gdata gwas glost gor galtered gwhile gthe gserver gwas goffline.
g
Which gtype gof gattack gis gthis?
g
A gModification
B gFabrication
C gInterception
D gInterruption g- g g g gcorrect ganswer.D
A gcompany ghas ghad gseveral gsuccessful gdenial gof gservice g(DoS) gattacks gon gits gemail gserver.
g
Which gsecurity gprinciple gis gbeing gattacked?
A gPossession
,B gIntegrity
C gConfidentiality
D gAvailability g- g g g gcorrect ganswer.D
A gnew gstart-up gcompany ghas gstarted gworking gon ga gsocial gnetworking gwebsite. gThe gcompany ghas
gmoved gall gits gsource gcode gto ga gcloud gprovider gand gwants gto gprotect gthis gsource gcode gfrom
gunauthorized gaccess.
g
Which gcyber gdefense gconcept gshould gthe gstart-up gcompany guse gto gmaintain gthe gconfidentiality gof gits
gsource gcode?
g
A gAlarm gsystems
B gAccount gpermissions
C gAntivirus gsoftware
D gFile gencryption g- g g g gcorrect ganswer.D
A gcompany ghas gan gannual gaudit gof ginstalled gsoftware gand gdata gstorage gsystems. gDuring gthe gaudit, gthe
gauditor gasks ghow gthe gcompany's gmost gcritical gdata gis gused. gThis gdetermination ghelps gthe gauditor
gensure gthat gthe gproper gdefense gmechanisms gare gin gplace gto gprotect gcritical gdata.
g
Which gprinciple gof gthe gParkerian ghexad gis gthe gauditor gaddressing?
A gPossession
B gIntegrity
C gAuthenticity
D gUtility g- g g g gcorrect ganswer.D
Which gweb gattack gis gpossible gdue gto ga glack gof ginput gvalidation?
g
A gExtraneous gfiles
B gClickjacking
C gSQL ginjection
, D gCross-site grequest gforgery g- g g g gcorrect ganswer.C
Which gfile gaction gimplements gthe gprinciple gof gconfidentiality gfrom gthe gCIA gtriad?
g
A gCompression
B gHash
C gBackup
D gEncryption g- g g g gcorrect ganswer.D
Which gcyber gdefense gconcept gsuggests glimiting gpermissions gto gonly gwhat gis gnecessary gto gperform ga
gparticular gtask?
g
A gAuthentication
B gAuthorization
C gDefense gin gdepth
D gPrinciple gof gleast gprivilege g- g g g gcorrect ganswer.D
A gcompany ginstitutes ga gnew gpolicy gthat g"All goffice gcomputer gmonitors gmust gface gtoward gemployees
gand gmust gface gaway gfrom gdoorways. gThe gmonitor gscreens gmust gnot gbe gvisible gto gpeople gvisiting gthe
goffice."
g
Which gprinciple gof gthe gCIA gtriad gis gthis gcompany gapplying?
A gAvailability
B gConfidentiality
C gUtility
D gIntegrity g- g g g gcorrect ganswer.B
At ga gsmall gcompany, gan gemployee gmakes gan gunauthorized gdata galteration.
g
Which gcomponent gof gthe gCIA gtriad ghas gbeen gcompromised?
Information Security Quizlet By Brian
Macfarlane Questions With Correct Answers.
Which gcybersecurity gterm gis gdefined gas gthe gpotential gfor gan gattack gon ga gresource?
A gImpact
B gVulnerability
C gRisk
D gThreat g- g g g gcorrect ganswer.D
Which gsecurity gtype gdeliberately gexposes ga gsystem's gvulnerabilities gor gresources gto gan gattacker?
A gIntrusion gdetection
B gFirewalls
C gHoneypots
D gIntrusion gprevention g- g g g gcorrect ganswer.C
Which gtool gcan gbe gused gto gmap gdevices gon ga gnetwork, galong gwith gtheir goperating gsystem gtypes gand
gversions?
A gPacket gsniffer
B gPacket gfilter
C gPort gscanner
D gStateful gfirewall g- g g g gcorrect ganswer.C
,Which gweb gattack gis ga gserver-side gattack?
A gClickjacking
B gCross-site gscripting
C gSQL ginjection
D gCross-site grequest gforgery g- g g g gcorrect ganswer.C
An gorganization gemploys ga gVPN gto gsafeguard gits ginformation. g
Which gsecurity gprinciple gis gprotected gby ga gVPN?
A gData gin gmotion
B gData gat grest
C gData gin guse
D gData gin gstorage g- g g g gcorrect ganswer.A
A gmalicious ghacker gwas gsuccessful gin ga gdenial gof gservice g(DoS) gattack gagainst gan ginstitution's gmail
gserver. gFortunately, gno gdata gwas glost gor galtered gwhile gthe gserver gwas goffline.
g
Which gtype gof gattack gis gthis?
g
A gModification
B gFabrication
C gInterception
D gInterruption g- g g g gcorrect ganswer.D
A gcompany ghas ghad gseveral gsuccessful gdenial gof gservice g(DoS) gattacks gon gits gemail gserver.
g
Which gsecurity gprinciple gis gbeing gattacked?
A gPossession
,B gIntegrity
C gConfidentiality
D gAvailability g- g g g gcorrect ganswer.D
A gnew gstart-up gcompany ghas gstarted gworking gon ga gsocial gnetworking gwebsite. gThe gcompany ghas
gmoved gall gits gsource gcode gto ga gcloud gprovider gand gwants gto gprotect gthis gsource gcode gfrom
gunauthorized gaccess.
g
Which gcyber gdefense gconcept gshould gthe gstart-up gcompany guse gto gmaintain gthe gconfidentiality gof gits
gsource gcode?
g
A gAlarm gsystems
B gAccount gpermissions
C gAntivirus gsoftware
D gFile gencryption g- g g g gcorrect ganswer.D
A gcompany ghas gan gannual gaudit gof ginstalled gsoftware gand gdata gstorage gsystems. gDuring gthe gaudit, gthe
gauditor gasks ghow gthe gcompany's gmost gcritical gdata gis gused. gThis gdetermination ghelps gthe gauditor
gensure gthat gthe gproper gdefense gmechanisms gare gin gplace gto gprotect gcritical gdata.
g
Which gprinciple gof gthe gParkerian ghexad gis gthe gauditor gaddressing?
A gPossession
B gIntegrity
C gAuthenticity
D gUtility g- g g g gcorrect ganswer.D
Which gweb gattack gis gpossible gdue gto ga glack gof ginput gvalidation?
g
A gExtraneous gfiles
B gClickjacking
C gSQL ginjection
, D gCross-site grequest gforgery g- g g g gcorrect ganswer.C
Which gfile gaction gimplements gthe gprinciple gof gconfidentiality gfrom gthe gCIA gtriad?
g
A gCompression
B gHash
C gBackup
D gEncryption g- g g g gcorrect ganswer.D
Which gcyber gdefense gconcept gsuggests glimiting gpermissions gto gonly gwhat gis gnecessary gto gperform ga
gparticular gtask?
g
A gAuthentication
B gAuthorization
C gDefense gin gdepth
D gPrinciple gof gleast gprivilege g- g g g gcorrect ganswer.D
A gcompany ginstitutes ga gnew gpolicy gthat g"All goffice gcomputer gmonitors gmust gface gtoward gemployees
gand gmust gface gaway gfrom gdoorways. gThe gmonitor gscreens gmust gnot gbe gvisible gto gpeople gvisiting gthe
goffice."
g
Which gprinciple gof gthe gCIA gtriad gis gthis gcompany gapplying?
A gAvailability
B gConfidentiality
C gUtility
D gIntegrity g- g g g gcorrect ganswer.B
At ga gsmall gcompany, gan gemployee gmakes gan gunauthorized gdata galteration.
g
Which gcomponent gof gthe gCIA gtriad ghas gbeen gcompromised?