Chapter 2:The Cybersecurity Cube

Chapter 2: The Cybersecurity Cube

Professional Development

12 Qs

quiz-placeholder

Similar activities

LAN Security

LAN Security

9th Grade - Professional Development

12 Qs

Network Plus Pre Assessment

Network Plus Pre Assessment

Professional Development

15 Qs

SAN Module 5 Quiz

SAN Module 5 Quiz

University - Professional Development

15 Qs

ITF - Quiz 14.3 - Authentication Factors

ITF - Quiz 14.3 - Authentication Factors

Professional Development

10 Qs

Authentication and Authorization

Authentication and Authorization

Professional Development

10 Qs

CNS Introduction -II

CNS Introduction -II

Professional Development

8 Qs

Authentication and Security Protocols

Authentication and Security Protocols

Professional Development

10 Qs

Quiz on Operating System Services

Quiz on Operating System Services

Professional Development

15 Qs

Chapter 2:The Cybersecurity Cube

Chapter 2: The Cybersecurity Cube

Assessment

Quiz

Computers

Professional Development

Hard

Created by

teacher bash

Used 5+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE SELECT QUESTION

45 sec • 10 pts

Which of the following are foundational principles of the cybersecurity domain? (Select 3)

confidentiality

authorization

integrity

availability

Answer explanation

Refer to curriculum topic: 2.1.1
Three foundational security principles are confidentiality, integrity and availability. 

2.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

What name is given to a storage device connected to a network?

DAS

NAS

SAN

RAID

Answer explanation

Refer to Chapter 2 - Slides 15 - Data at Rest
A network attached storage (NAS) device is a storage device connected to a network that allows storage and retrieval of data from a centralized location by authorized network users. NAS devices are flexible and scalable, meaning administrators can increase the capacity as needed.

3.

MULTIPLE SELECT QUESTION

45 sec • 10 pts

What are the three states of data? (Choose three)

at rest

encrypted

in-process

in-transit

Answer explanation

Refer to curriculum topic: 2.3.1
The protection of the cyber world requires cybersecurity professionals to account for the safeguarding of data in-transit, in-cloud, and at rest. 

4.

FILL IN THE BLANK QUESTION

1 min • 10 pts

What is a method of sending information from one device to another using removable media?

Answer explanation

Refer to Chapter 2 - Slides 16 - Data In Transit
Sneaker net – uses removable media to physically move data from one computer to another

5.

MULTIPLE SELECT QUESTION

45 sec • 10 pts

Which two methods help to ensure data integrity? (Choose two.)

hashing

repudiation

availability

data consistency checks

Answer explanation

Refer to Chapter 2 - Slides 11 - Integrity
Methods used to ensure data integrity include hashing, data validation checks, data consistency checks, and access controls. 

6.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Which security service determines which resources a user can access along with the operations that a user can perform?

accounting

authentication

authorization

biometric

Answer explanation

Refer to Chapter 2 - Slides 8 - Confidentiality
Authorization services determine which resources users can access, along with the operations that users can perform. Authorization can also control when a user has access to a specific resource. 

7.

MULTIPLE CHOICE QUESTION

30 sec • 10 pts

Which security service verifies the identity of a user to prevent unauthorized access?

accounting

authentication

authorization

biometric

Answer explanation

Refer to Chapter 2 - Slides 8 - Confidentiality
Authentication verifies the identity of a user to prevent unauthorized access. Users prove their identity with a username or I.D

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?