Search Header Logo
M5U1 - Security Concerns(SY24-25/C103-103I)

M5U1 - Security Concerns(SY24-25/C103-103I)

Assessment

Presentation

Computers

University

Hard

Created by

Don Bonus

Used 3+ times

FREE Resource

18 Slides • 12 Questions

1

media

2

media

3

Multiple Choice

This means that the information is stored and transferred as

intended and that any modification is authorized.

1

Confidentiality

2

Integrity

3

Availability

4

Security

4

Multiple Choice

This is any attempt to get access on data or telephone conversations as they pass over the network.

1

Sniffing

2

Snooping

3

Social Engineering

4

Dumpster Diving

5

media

6

media

7

Multiple Choice

This is where a host captures another host's response to some

server and replays that response in an effort to gain unauthorized

access.

1

Man in the middle

2

Impersonation

3

Replay Attack

4

Denial of service

8

Multiple Choice

This is any situation where an attacker targets

the availability of a service.

1

Man

in the Middle

2

Replay Attack

3

Impersonation

4

Denial of Service

9

media

10

media

11

media

12

Multiple Choice

Getting people to reveal confidential information

1

Snooping

2

Sniffing

3

Eavesdropping

4

Social Engineering

13

media

14

media

15

media

16

media

17

media

18

Multiple Choice

It uses two disks. Each write operation

is performed on both disks so that one is a mirror of the other.

1

RAID 0

2

RAID 1

3

RAID 10

4

RAID 5

19

Multiple Choice

Replication can be used to synchronize data between multiple sites

1

Data Redundancy

2

Network Redundancy

3

Site Redundancy

4

Power Redundancy

20

media

21

media

22

media

23

media

24

media

25

media

26

Multiple Choice

This means getting users to reveal information.

1

Eavesdropping

2

Snooping

3

Dumpster

diving

4

Social engineering

27

Multiple Choice

Create barriers around the resource such that only authenticated users can gain

access.

1

Authentication

2

Authorization

3

Accounting

4

Access Control

28

Multiple Choice

This means that the information should only be known to

authorized users.

1

Security

2

Confidentiality

3

Integrity

4

Availability

29

Multiple Choice

Multiple hard disks can be configured to provide performance and/or protection for data (fault tolerance)

1

RAID

2

Back-up

3

Cloud

4

Storage Appliance

30

Multiple Choice

The goals for providing a secure information management system.

1

AAA

2

Network Security

3

CIA

4

Disaster Prevention

media

Show answer

Auto Play

Slide 1 / 30

SLIDE