100% de satisfacción garantizada Inmediatamente disponible después del pago Tanto en línea como en PDF No estas atado a nada 4,6 TrustPilot
logo-home
Examen

Fundamentals of Information Security

Puntuación
-
Vendido
-
Páginas
14
Grado
A+
Subido en
24-10-2024
Escrito en
2024/2025

Which type of system is considered absolutely secure? A. A system that is new. B. A system that has been recently patched. C. A system that has been in production for many years. D. A system that is shut off and disconnected from all networks. - answer-D. A system that is shut off and disconnected from all networks. Which concept of the CIA Triad is associated with reliability? A. Availability B. Confidentiality C. Authentication D. Integrity - answer-D. Integrity (it ensures data has not been tampered with & its correct, authentic, & reliable. A malicious actor has breached the firewall with a reverse shell. Which side of the CIA triad is most affected? A. Availability B. Confidentially C. Authentication D. Integrity - answer-B. Confidentiality A user changes a number in a dataset with a typo. Which side of the CIA Triad is most affected? A. Availability B. Confidentiality C. Authentication D. Integrity - answer-D. Integrity What is an example of identification? A. Fingerprint B. Mothers Maiden Name C. Captcha Tests D. Username - answer-D. Username What are 3 forms of authentication? A. Four-digit PIN number B. Text of 6-digit number to phone C. Phone number D. Fingerprint E. Account Number F. Username - answer-A. Four-digit PIN number B. Text of 6-digit number to phone D. Fingerprint What is an example of identification? A. Voice Pattern B. Write access C. Email Address D. Mother's Maiden Name - answer-C. Email Address What is an example of authentication? A. Username B. Write Access C. Email Address D. Mother's Maiden Name - answer-D. Mother's Maiden Name What is the final step in allowing access to resources? A. Identification B. Authentication C. Authorization D. Accountability - answer-C. Authorization Which example demonstrates access control? A. Turning the key in the ignition of a car. B. Locking and unlocking the doors of your house. C. Selecting a pin for a new account. D. Changing a bank account password. - answer-B. Locking and unlocking the doors of your house. Which type of access control model is a CAPTCHA an example of? A. Role-based B. Mandatory-based C. Discretionary-based D. Attribute-based - answer-D. Attribute-based What is a sandbox? A. A tool only used in Java B. An isolated environment that protects a set of resources. C. Part of VPN connection D. A virtual location to share digital information - answer-B. An isolated environment that protects a set of resources. A tornado destroyed a data center. Eh I hidden of the CIA triad is most affected? A. Authenticity B. Availability C. Utility D. Integrity - answer-B. Availability What element of the parkerian hexad concerned with usefulness? A. Integrity B. Confidentiality C. Utility D. Availability - answer-C. Utility Which attribute of the parkerian hexad allows for proper attribution of the owner of a dataset? A. Possession B. Availability C. Authenticity D. Integrity - answer-C. Authenticity Which type of attack category is an attack against confidentiality? A. Interception B. Modification C. Fabrication D. Interruption - answer-A. Interception Which 2 attributes are included in the concept of risk? Choose 2 answers A. Threats B. Frequency C. Vulnerabilities D. Impacts - answer-A. Threats C. Vulnerabilities Which phase of the incident response process includes putting the system back better than the original state? A. Post-incident activity. B. Containment. C. Recovery. D. Detection and Analysis - answer-C. Recovery Which concept refers to adding layers of security to our networks? A. Administrative control depth B. Defense in depth. C. Physical control depth. D. Logical control depth. - answer-B. Defense in depth. Which combination of factors demonstrates multifactor authentication? A. Fingerprint and voice print B. Password and Pin. C. Password and fingerprint. D. Voice print and weight. - answer-C. Password and fingerprint. What is the name of the process where the client authenticates the server in the server authenticates the client? A. Token based authentication. B. Mutual authentication. C. Two factor authentication. D. Multi factor authentication. - answer-C. Mutual authentication. What is an example of identification? A. Text to Cell Phone. B. Employee number C. Update access. D. Fingerprint. - answer-B. Employee number What is an example of authentication? A. Username. B. First car. C. Read only. D. Pin - answer-D. Pin Which factors demonstrate multifactor authentication? A. Vein patterns and iris scan. B. User name and email address. C. Childhood pet and mothers maiden name. D. Mothers maiden name and voice print. - answer-D. Mothers, maiden name, and voice print What is an objective for performing an audit? A. To ensure a company can respond effectively to a disaster. B. To ensure compliance and detect misuse. C. To ensure potential risks are identified and analyzed. D. To ensure proper access is granted to resources. - answer-B. To ensure compliance and detect misuse. What are two common values for a net work access control list (ACL)? Choose two answers.

Mostrar más Leer menos
Institución
Fundamentals Of Information Security
Grado
Fundamentals of Information Security









Ups! No podemos cargar tu documento ahora. Inténtalo de nuevo o contacta con soporte.

Escuela, estudio y materia

Institución
Fundamentals of Information Security
Grado
Fundamentals of Information Security

Información del documento

Subido en
24 de octubre de 2024
Número de páginas
14
Escrito en
2024/2025
Tipo
Examen
Contiene
Preguntas y respuestas

Temas

Vista previa del contenido

FUNDAMENTALS
OF
INFORMATION
SECURITY
[Document subtitle]

, Fundamentals of Information Security
Which type of system is considered absolutely secure?

A. A system that is new.
B. A system that has been recently patched.
C. A system that has been in production for many years.
D. A system that is shut off and disconnected from all networks. - answer-D. A system that is shut off and
disconnected from all networks.

Which concept of the CIA Triad is associated with reliability?

A. Availability
B. Confidentiality
C. Authentication
D. Integrity - answer-D. Integrity (it ensures data has not been tampered with & its correct, authentic, &
reliable.

A malicious actor has breached the firewall with a reverse shell. Which side of the CIA triad is most
affected?

A. Availability
B. Confidentially
C. Authentication
D. Integrity - answer-B. Confidentiality

A user changes a number in a dataset with a typo. Which side of the CIA Triad is most affected?

A. Availability
B. Confidentiality
C. Authentication
D. Integrity - answer-D. Integrity

What is an example of identification?

A. Fingerprint
B. Mothers Maiden Name
C. Captcha Tests
D. Username - answer-D. Username

What are 3 forms of authentication?

A. Four-digit PIN number
B. Text of 6-digit number to phone
C. Phone number
D. Fingerprint
E. Account Number
$10.49
Accede al documento completo:

100% de satisfacción garantizada
Inmediatamente disponible después del pago
Tanto en línea como en PDF
No estas atado a nada

Conoce al vendedor

Seller avatar
Los indicadores de reputación están sujetos a la cantidad de artículos vendidos por una tarifa y las reseñas que ha recibido por esos documentos. Hay tres niveles: Bronce, Plata y Oro. Cuanto mayor reputación, más podrás confiar en la calidad del trabajo del vendedor.
TOPDOCTOR Abacus College, Oxford
Seguir Necesitas iniciar sesión para seguir a otros usuarios o asignaturas
Vendido
10
Miembro desde
2 año
Número de seguidores
5
Documentos
3396
Última venta
3 meses hace
TOPGRADER!!

Looking for relevant and updated study material to help you ace your exams? TOPTIERGRADES has your back!!! I have essential exams, test-banks, study bites, assignments all graded A+, Have Complete solutions, and are updated regularly. Please feel free to message me if you are looking for a specific test bank that is not listed on my profile or want a test bank or exam sent to you directly as google doc link. In the event that any of the materials have an issue, please let me know and I\'ll do my best to resolve it or provide an alternative. Thank You & All The Very BEST!!!!!

Lee mas Leer menos
5.0

1 reseñas

5
1
4
0
3
0
2
0
1
0

Recientemente visto por ti

Por qué los estudiantes eligen Stuvia

Creado por compañeros estudiantes, verificado por reseñas

Calidad en la que puedes confiar: escrito por estudiantes que aprobaron y evaluado por otros que han usado estos resúmenes.

¿No estás satisfecho? Elige otro documento

¡No te preocupes! Puedes elegir directamente otro documento que se ajuste mejor a lo que buscas.

Paga como quieras, empieza a estudiar al instante

Sin suscripción, sin compromisos. Paga como estés acostumbrado con tarjeta de crédito y descarga tu documento PDF inmediatamente.

Student with book image

“Comprado, descargado y aprobado. Así de fácil puede ser.”

Alisha Student

Preguntas frecuentes