Search Header Logo
securitty chapter 1

securitty chapter 1

Assessment

Presentation

Computers

University

Easy

Created by

earnest colvin

Used 5+ times

FREE Resource

51 Slides • 20 Questions

1

securitty chapter 1

Slide image

2

Slide image

3

Slide image

4

Multiple Choice

As a security professional, you are responsible for data protection. You are NOT responsible for compromised reputation, loss of goodwill, loss of customers, or financial impacts.

1

true

2

false

5

Multiple Choice

Information security refers to the protection of available information or information resources from authorized access, attacks, thefts, or data damage.

1

true

2

false

6

Slide image

7

Slide image

8

Multiple Choice

A security lock on a building’s access door is an example of what type of security control?

1

Correction control

2

Detection control

3

Prevention control

9

Multiple Choice

Surveillance cameras that view all that happens around a building are an example of what type of security control?

1

Correction control

2

Detection control

10

Multiple Choice

A security guard who responds to a silent alarm is an example of what type of security control?

1

Correction control

2

Detection control

11

Multiple Select

What are the three primary goals involved in the practice of information security? Select three

1

Risk

2

Prevention

3

Detection

4

Recovery

12

Slide image

13

Slide image

14

Slide image

15

Slide image

16

Slide image

17

Slide image

18

Slide image

19

Slide image

20

Slide image

21

Slide image

22

Multiple Select

What is the triad of specific principles related to information security? Select three.

1

Confidentiality

2

Integrity

3

Availability

4

Non-repudiation

23

Slide image

24

Slide image

25

Multiple Choice

The goal of ensuring the party that sent a transmission or created data remains associated with that data is ___________________.

1

Identification

2

Non-repudiation

26

Slide image

27

Multiple Choice

A method that ensures that an entity requesting access to resources by using a certain set of credentials is the true owner of the credentials is ____________________.

1

Identification

2

Non-repudiation

28

Slide image

29

Multiple Choice

A method of validating a particular entity or individual’s unique credentials is ______________.

1

Availability

2

Authentication

30

Slide image

31

Slide image

32

Slide image

33

Slide image

34

Slide image

35

Slide image

36

Slide image

37

Slide image

38

Slide image

39

Multiple Choice

Physical or virtual objects that store authentication information are __________.

1

Biometrics

2

Tokens

40

Slide image

41

Slide image

42

Multiple Choice

A radio-frequency ID embedded into hardware is an example of what type of authentication method?

1

Biometrics

2

Geolocation

43

Slide image

44

Slide image

45

Multiple Choice

Providing information such as who you are, what you have, and what you know are examples of what type of authentication?

1

Mutual Authentication

2

Multi-factor Authentication

46

Slide image

47

Slide image

48

Slide image

49

Slide image

50

Slide image

51

Slide image

52

Slide image

53

Slide image

54

Slide image

55

Slide image

56

Slide image

57

Multiple Choice

An algorithm used to encrypt, or decrypt data is ___________________.

1

Quantum

2

Cipher

58

Multiple Choice

A type of encryption that encrypts data one bit at a time is a

1

Bit Cipher

2

Stream Cipher

59

Slide image

60

Slide image

61

Slide image

62

Slide image

63

Multiple Choice

A two-way encryption scheme in which encryption and decryption are both performed by the same key is ____________________.

1

Hashing Encryption

2

Symmetric Encryption

64

Slide image

65

Multiple Choice

A one-way encryption that transforms clear text into cipher text that is not intended to be decrypted is referred to as ___________________________.

1

Hashing Encryption

2

One-time Pad

66

Multiple Choice

A two-way encryption scheme implementing both a private key and a public key is _______________________.

1

Hashing Encryption

2

Asymmetric Encryption

67

Multiple Choice

A collection of asymmetric and symmetric encryption algorithms used to establish secure communications is known as _____________________.

1

Session Key

2

Cipher Suite

68

Slide image

69

Multiple Choice

Hiding information in a photograph is an example of what type of cipher process?

1

Graphic Cipher

2

Steganography

70

Slide image

71

Slide image

securitty chapter 1

Slide image

Show answer

Auto Play

Slide 1 / 71

SLIDE