Cybersecurity Fundamentals - Chapter 2

Cybersecurity Fundamentals - Chapter 2

Professional Development

10 Qs

quiz-placeholder

Similar activities

Kaizen Best Presentation

Kaizen Best Presentation

Professional Development

10 Qs

Cybersecurity Fundamentals - Chapter 1

Cybersecurity Fundamentals - Chapter 1

Professional Development

10 Qs

Sales Academy Review Game

Sales Academy Review Game

Professional Development

10 Qs

WK09 Leadership

WK09 Leadership

University - Professional Development

11 Qs

OCP Quiz: How much do you know about Mazda?

OCP Quiz: How much do you know about Mazda?

Professional Development

10 Qs

Google Level 1

Google Level 1

Professional Development

14 Qs

Are you a QA QUIZ WIZZ?

Are you a QA QUIZ WIZZ?

Professional Development

10 Qs

WCO Summit 2021 GAME KNB? -CHAMPIONSHIP ROUND

WCO Summit 2021 GAME KNB? -CHAMPIONSHIP ROUND

Professional Development

15 Qs

Cybersecurity Fundamentals - Chapter 2

Cybersecurity Fundamentals - Chapter 2

Assessment

Quiz

Other

Professional Development

Medium

Created by

Raymond Tan

Used 30+ times

FREE Resource

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What name is given to a storage device connected to a network?

DAS
Refer to Chapter 2 - Slides 14 - Data at Rest

Direct-attached storage (DAS) is storage connected to a computer. A hard drive or USB flash drive is an example of direct-attached storage.

NAS
Refer to Chapter 2 - Slides 15 - Data at Rest

A network attached storage (NAS) device is a storage device connected to a network that allows storage and retrieval of data from a centralized location by authorized network users. NAS devices are flexible and scalable, meaning administrators can increase the capacity as needed.

SAN
Refer to Chapter 2 - Slides 15 - Data at Rest

A storage area network (SAN) architecture is a network-based storage system. SAN systems connect to the network using high-speed interfaces allowing improved performance and the ability to connect multiple servers to a centralized disk storage repository

RAID
Refer to Chapter 2 - Slides 15 - Data at Rest

Redundant array of independent disks (RAID) uses multiple hard drives in an array, which is a method of combining multiple disks so that the operating system sees them as a single disk. RAID provides improved performance and fault tolerance

2.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are the three states of data? (Choose three.)

at rest
Refer to curriculum topic: 2.3.1

The protection of the cyber world requires cybersecurity professionals to account for the safeguarding of data in-transit, in-cloud, and at rest.

encrypted

in-process

in-transit

3.

FILL IN THE BLANK QUESTION

1 min • 1 pt

What is a method of sending information from one device to another using removable media?
Refer to Chapter 2 - Slides 16 - Data In Transit

Uses removable media to physically move data from one computer to another

4.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

Which two methods help to ensure data integrity? (Choose two.)

hashing
Refer to Chapter 2 - Slides 11 - Integrity

Methods used to ensure data integrity include hashing, data validation checks, data consistency checks, and access controls.

repudiation

availability
Refer to Chapter 2 - Slides 12 - Availability

Data availability is the principle used to describe the need to maintain availability of information systems and services at all times. Cyberattacks and system failures can prevent access to information systems and services.

data consistency checks

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What service determines which resources a user can access along with the operations that a user can perform?

accounting
Refer to Chapter 2 - Slides 8 - Confidentiality

Accounting keeps track of what users do, including what they access, the amount of time they access resources, and any changes made.

authentication
Refer to Chapter 2 - Slides 8 - Confidentiality

Authentication verifies the identity of a user to prevent unauthorized access. Users prove their identity with a username or I.D

authorization
Refer to Chapter 2 - Slides 8 - Confidentiality

Authorization services determine which resources users can access, along with the operations that users can perform. Authorization can also control when a user has access to a specific resource.

biometric

6.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

What are two common hash functions? (Choose two.)

Blowfish

MD5
Refer to Chapter 2 - Slides 11 - Integrity

Common hash functions include MD5, SHA-1, SHA-256, and SHA-512. These hash functions use complex mathematical algorithms. The hashed value is simply there for comparison. For example, after downloading a file, the user can verify the integrity of the file by comparing the hash values from the source with the one generated by any hash calculator.

RSA

SHA

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What mechanism can organizations use to prevent accidental changes by authorized users?

backups
Refer to Chapter 2 - Slides 11 - Integrity

Accurate backups help to maintain data integrity if data becomes corrupted. An organization needs to verify its backup process to ensure the integrity of the backup before data loss occurs.

Refer to Chapter 2 - Slides 12 - Availability

Methods used to ensure availability include system redundancy, system backups, increased system resiliency, equipment maintenance, up-to-date operating systems and software, and plans in place to recover quickly from unforeseen disasters

encryption
Refer to Chapter 2 - Slides 7 - Confidentiality

Methods used to ensure confidentiality include data encryption, authentication, and access control.

hashing
Refer to Chapter 2 - Slides 11 - Integrity

Methods used to ensure data integrity include hashing, data validation checks, data consistency checks, and access controls. Data integrity systems can include one or more of the methods listed above.

version control
Refer to Chapter 2 - Slides 11 - Integrity

Organizations use version control to prevent accidental changes by authorized users. Two users cannot update the same object. Objects can be files, database records, or transactions. For example, the first user to open a document has the permission to change that document; the second person has a read-only version.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?