
Revision for Chapter 2
Authored by Kevin Wong
Computers
University
Used 2+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The first dimension of the cybersecurity cube,
what is the three foundational principles of the cybersecurity world?
Confidentiality, Integrity and availablity
Confidentiality, Integrity and probability
Confidentiality, publicity and availability
Confidentiality, Integrity and availability
Answer explanation
Use the acronym CIA to remember these three principles.
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The cyber world is a world of data; therefore, cybersecurity specialists focus on protecting data. The second dimension of the cybersecurity cube focuses on the problems of protecting all of the states of data in the cyber world. Data has three possible states
Data at rest or in storage, Data in transit and Data in process
Data at rest or in preservation, Data in transit and Data in process
Data at rest or in storage, Data in motion and Data in process
Data at rest or in storage, Data in transit and Data in proceed
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The third dimension of the cybersecurity sorcery cube
defines the types of powers used to protect the cyber world.
The sorcery cube identifies the three types of powers:
Electronic technologies, Policies & Practices and People
Technologies, Policies & Best Practices and People
Technologies, Policies & Practices and People
Technologies, Policies & Practices and Specialists
Answer explanation
Technologies - devices, and products available to protect information systems and fend off cyber criminals.
Policies and Practices - procedures, and guidelines that enable the citizens of the cyber world to stay safe and follow good practices.
People - Aware and knowledgeable about their world and the dangers that threaten their world.
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are the 3 dimensions of Cybersecurity Cube (McCumber Cube)?
Security Princiles, Information states and Counter measures
Security Principles, Information states and Counter measures
Security Priciples, Information states and Counter measures
Securiy Principles, Information states and Counter measures
Answer explanation
Technologies - devices, and products available to protect information systems and fend off cyber criminals.
Policies and Practices - procedures, and guidelines that enable the citizens of the cyber world to stay safe and follow good practices.
People - Aware and knowledgeable about their world and the dangers that threaten their world.
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Controlling Access
Access control defines a number of protection schemes that prevent unauthorized access to a computer, network, database, or other data resources. The concepts of AAA involve three security services:
Authentication, Authorization and Accounting
Authentcation, Authorization and Accounting
Authentication, Authorizaton and Accounting
Authentication, Authorization and Accountng
Answer explanation
Authentication verifies the identity of a user to prevent unauthorized access. Users prove their identity with a username or I.D.
Authorization services determine which resources users can access, along with the operations that users can perform. Authorization can also control when a user has access to a specific resource.
Accounting keeps track of what users do, including what they access, the amount of time they access resources, and any changes made.
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What are some of the Cybersecurity Countermeasures
Technologies?
Software-based Technology Safeguards,
Connection-based Technology Safeguards,
Network-based Technology Safeguards and
Environmental-based Technology Safeguards
Software-based Technology Safeguards,
Hardware-based Technology Safeguards,
Network-based Technology Safeguards and
Cloud-based Technology Safeguards
Software-based Technology Safeguards,
Hardware-based Technology Safeguards,
Network-based Topology Safeguards and
Environmental-based Technology Safeguards
Software-based Technology Safeguards,
Hardware-based Technology Safeguards,
Network-based Technology Safeguards and
Environmental-based Technology Safeguards
Answer explanation
Network-based Technology Safeguards
Technological countermeasures can also include network-based technologies.
- Virtual Private Network (VPN) is a secure virtual network that uses the public network (i.e., the Internet). The security of a VPN lies in the encryption of packet content between the endpoints that define the VPN.
- Network access control (NAC) requires a set of checks before allowing a device to connect to a network. Some common checks include up-to-data antivirus software or operating system updates installed.
- Wireless access point security includes the implementation of authentication and encryption.
7.
MULTIPLE SELECT QUESTION
45 sec • 1 pt
The Cybersecurity Countermeasure Technologies include Cloud Based Technology. Name the 3 types of cloud based services which could be implemented for technological safeguards.
Technologies?
Software as a Service (SaaS)
Infrastructure as a Service (IaaS)
Virtual Security Appliances
Answer explanation
Network-based Technology Safeguards
Technological countermeasures can also include network-based technologies.
- Virtual Private Network (VPN) is a secure virtual network that uses the public network (i.e., the Internet). The security of a VPN lies in the encryption of packet content between the endpoints that define the VPN.
- Network access control (NAC) requires a set of checks before allowing a device to connect to a network. Some common checks include up-to-data antivirus software or operating system updates installed.
- Wireless access point security includes the implementation of authentication and encryption.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?