Search Header Logo

Revision for Chapter 2

Authored by Kevin Wong

Computers

University

Used 2+ times

Revision for Chapter 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

The first dimension of the cybersecurity cube,

what is the three foundational principles of the cybersecurity world?

Confidentiality, Integrity and availablity

Confidentiality, Integrity and probability

Confidentiality, publicity and availability

Confidentiality, Integrity and availability

Answer explanation

Use the acronym CIA to remember these three principles.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

The cyber world is a world of data; therefore, cybersecurity specialists focus on protecting data. The second dimension of the cybersecurity cube focuses on the problems of protecting all of the states of data in the cyber world. Data has three possible states

Data at rest or in storage, Data in transit and Data in process

Data at rest or in preservation, Data in transit and Data in process

Data at rest or in storage, Data in motion and Data in process

Data at rest or in storage, Data in transit and Data in proceed

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

The third dimension of the cybersecurity sorcery cube

defines the types of powers used to protect the cyber world.

The sorcery cube identifies the three types of powers:

Electronic technologies, Policies & Practices and People

Technologies, Policies & Best Practices and People

Technologies, Policies & Practices and People

Technologies, Policies & Practices and Specialists

Answer explanation

Technologies - devices, and products available to protect information systems and fend off cyber criminals.

Policies and Practices - procedures, and guidelines that enable the citizens of the cyber world to stay safe and follow good practices.

People - Aware and knowledgeable about their world and the dangers that threaten their world.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

What are the 3 dimensions of Cybersecurity Cube (McCumber Cube)?

Security Princiles, Information states and Counter measures

Security Principles, Information states and Counter measures

Security Priciples, Information states and Counter measures

Securiy Principles, Information states and Counter measures

Answer explanation

Technologies - devices, and products available to protect information systems and fend off cyber criminals.

Policies and Practices - procedures, and guidelines that enable the citizens of the cyber world to stay safe and follow good practices.

People - Aware and knowledgeable about their world and the dangers that threaten their world.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Media Image

Controlling Access

Access control defines a number of protection schemes that prevent unauthorized access to a computer, network, database, or other data resources. The concepts of AAA involve three security services:

Authentication, Authorization and Accounting

Authentcation, Authorization and Accounting

Authentication, Authorizaton and Accounting

Authentication, Authorization and Accountng

Answer explanation

Authentication verifies the identity of a user to prevent unauthorized access. Users prove their identity with a username or I.D.

Authorization services determine which resources users can access, along with the operations that users can perform. Authorization can also control when a user has access to a specific resource.

Accounting keeps track of what users do, including what they access, the amount of time they access resources, and any changes made.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What are some of the Cybersecurity Countermeasures
Technologies?

Software-based Technology Safeguards,

Connection-based Technology Safeguards,

Network-based Technology Safeguards and

Environmental-based Technology Safeguards

Software-based Technology Safeguards,

Hardware-based Technology Safeguards,

Network-based Technology Safeguards and

Cloud-based Technology Safeguards

Software-based Technology Safeguards,

Hardware-based Technology Safeguards,

Network-based Topology Safeguards and

Environmental-based Technology Safeguards

Software-based Technology Safeguards,

Hardware-based Technology Safeguards,

Network-based Technology Safeguards and

Environmental-based Technology Safeguards

Answer explanation

Media Image

Network-based Technology Safeguards

Technological countermeasures can also include network-based technologies.

  • - Virtual Private Network (VPN) is a secure virtual network that uses the public network (i.e., the Internet). The security of a VPN lies in the encryption of packet content between the endpoints that define the VPN.

  • - Network access control (NAC) requires a set of checks before allowing a device to connect to a network. Some common checks include up-to-data antivirus software or operating system updates installed.

  • - Wireless access point security includes the implementation of authentication and encryption.

7.

MULTIPLE SELECT QUESTION

45 sec • 1 pt

The Cybersecurity Countermeasure Technologies include Cloud Based Technology. Name the 3 types of cloud based services which could be implemented for technological safeguards.
Technologies?

Software as a Service (SaaS)

Infrastructure as a Service (IaaS)

Virtual Security Appliances

Answer explanation

Media Image

Network-based Technology Safeguards

Technological countermeasures can also include network-based technologies.

  • - Virtual Private Network (VPN) is a secure virtual network that uses the public network (i.e., the Internet). The security of a VPN lies in the encryption of packet content between the endpoints that define the VPN.

  • - Network access control (NAC) requires a set of checks before allowing a device to connect to a network. Some common checks include up-to-data antivirus software or operating system updates installed.

  • - Wireless access point security includes the implementation of authentication and encryption.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?