
Cybersecurity Fundamentals - Chapter 2

Quiz
•
Other
•
Professional Development
•
Medium
Raymond Tan
Used 30+ times
FREE Resource
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What name is given to a storage device connected to a network?
DAS
Refer to Chapter 2 - Slides 14 - Data at Rest
Direct-attached storage (DAS) is storage connected to a computer. A hard drive or USB flash drive is an example of direct-attached storage.
NAS
Refer to Chapter 2 - Slides 15 - Data at Rest
A network attached storage (NAS) device is a storage device connected to a network that allows storage and retrieval of data from a centralized location by authorized network users. NAS devices are flexible and scalable, meaning administrators can increase the capacity as needed.
SAN
Refer to Chapter 2 - Slides 15 - Data at Rest
A storage area network (SAN) architecture is a network-based storage system. SAN systems connect to the network using high-speed interfaces allowing improved performance and the ability to connect multiple servers to a centralized disk storage repository
RAID
Refer to Chapter 2 - Slides 15 - Data at Rest
Redundant array of independent disks (RAID) uses multiple hard drives in an array, which is a method of combining multiple disks so that the operating system sees them as a single disk. RAID provides improved performance and fault tolerance
2.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are the three states of data? (Choose three.)
at rest
Refer to curriculum topic: 2.3.1
The protection of the cyber world requires cybersecurity professionals to account for the safeguarding of data in-transit, in-cloud, and at rest.
encrypted
in-process
in-transit
3.
FILL IN THE BLANK QUESTION
1 min • 1 pt
What is a method of sending information from one device to another using removable media?
Refer to Chapter 2 - Slides 16 - Data In Transit
Uses removable media to physically move data from one computer to another
4.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
Which two methods help to ensure data integrity? (Choose two.)
hashing
Refer to Chapter 2 - Slides 11 - Integrity
Methods used to ensure data integrity include hashing, data validation checks, data consistency checks, and access controls.
repudiation
availability
Refer to Chapter 2 - Slides 12 - Availability
Data availability is the principle used to describe the need to maintain availability of information systems and services at all times. Cyberattacks and system failures can prevent access to information systems and services.
data consistency checks
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What service determines which resources a user can access along with the operations that a user can perform?
accounting
Refer to Chapter 2 - Slides 8 - Confidentiality
Accounting keeps track of what users do, including what they access, the amount of time they access resources, and any changes made.
authentication
Refer to Chapter 2 - Slides 8 - Confidentiality
Authentication verifies the identity of a user to prevent unauthorized access. Users prove their identity with a username or I.D
authorization
Refer to Chapter 2 - Slides 8 - Confidentiality
Authorization services determine which resources users can access, along with the operations that users can perform. Authorization can also control when a user has access to a specific resource.
biometric
6.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
What are two common hash functions? (Choose two.)
Blowfish
MD5
Refer to Chapter 2 - Slides 11 - Integrity
Common hash functions include MD5, SHA-1, SHA-256, and SHA-512. These hash functions use complex mathematical algorithms. The hashed value is simply there for comparison. For example, after downloading a file, the user can verify the integrity of the file by comparing the hash values from the source with the one generated by any hash calculator.
RSA
SHA
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What mechanism can organizations use to prevent accidental changes by authorized users?
backups
Refer to Chapter 2 - Slides 11 - Integrity
Accurate backups help to maintain data integrity if data becomes corrupted. An organization needs to verify its backup process to ensure the integrity of the backup before data loss occurs.
Refer to Chapter 2 - Slides 12 - Availability
Methods used to ensure availability include system redundancy, system backups, increased system resiliency, equipment maintenance, up-to-date operating systems and software, and plans in place to recover quickly from unforeseen disasters
encryption
Refer to Chapter 2 - Slides 7 - Confidentiality
Methods used to ensure confidentiality include data encryption, authentication, and access control.
hashing
Refer to Chapter 2 - Slides 11 - Integrity
Methods used to ensure data integrity include hashing, data validation checks, data consistency checks, and access controls. Data integrity systems can include one or more of the methods listed above.
version control
Refer to Chapter 2 - Slides 11 - Integrity
Organizations use version control to prevent accidental changes by authorized users. Two users cannot update the same object. Objects can be files, database records, or transactions. For example, the first user to open a document has the permission to change that document; the second person has a read-only version.
Create a free account and access millions of resources
Similar Resources on Wayground
11 questions
WK09 Leadership

Quiz
•
University - Professi...
15 questions
POST-TEST TIK LAMPUNG

Quiz
•
Professional Development
12 questions
TXT Quiz- Easy

Quiz
•
KG - Professional Dev...
10 questions
Evaluasi Data Integrity

Quiz
•
Professional Development
10 questions
Values & Culture

Quiz
•
Professional Development
7 questions
Intro to office and presentations

Quiz
•
Professional Development
10 questions
Kaizen Best Presentation

Quiz
•
Professional Development
10 questions
Sales Academy Review Game

Quiz
•
Professional Development
Popular Resources on Wayground
50 questions
Trivia 7/25

Quiz
•
12th Grade
11 questions
Standard Response Protocol

Quiz
•
6th - 8th Grade
11 questions
Negative Exponents

Quiz
•
7th - 8th Grade
12 questions
Exponent Expressions

Quiz
•
6th Grade
4 questions
Exit Ticket 7/29

Quiz
•
8th Grade
20 questions
Subject-Verb Agreement

Quiz
•
9th Grade
20 questions
One Step Equations All Operations

Quiz
•
6th - 7th Grade
18 questions
"A Quilt of a Country"

Quiz
•
9th Grade