Module 1 - OLD

Module 1 - OLD

University

65 Qs

quiz-placeholder

Similar activities

Network and Security Foundations

Network and Security Foundations

University - Professional Development

66 Qs

ID and Access Management

ID and Access Management

10th Grade - University

70 Qs

System Security

System Security

University

60 Qs

Unit 2: Cryptography

Unit 2: Cryptography

8th Grade - University

64 Qs

22CA2015 - Mobile Hacking - Surprise Quiz 1

22CA2015 - Mobile Hacking - Surprise Quiz 1

University

65 Qs

special exam in elec4

special exam in elec4

University

60 Qs

Baldwin University College. Osu Accra.  Level 300

Baldwin University College. Osu Accra. Level 300

University

60 Qs

Cyber security class test 3

Cyber security class test 3

University

70 Qs

Module 1 - OLD

Module 1 - OLD

Assessment

Quiz

Computers

University

Hard

Created by

Sebastian Zamorano

FREE Resource

65 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following statements BEST describes the Control Plane in the Zero Trust model?
Limits potential damage zones in a network.
Decides on access based on policies and threats.
Ensures efficient transmission of approved data.
Employs security decisions based on user behavior.

Answer explanation

OBJ: 1.2 - The Control Plane within the Zero Trust model is fundamentally responsible for deciding on access based on policies and threats, which is a dynamic and multifaceted task.  While it does consider user behavior as part of its decision-making process, employing security decisions based on user behavior is only one aspect of its function. Although the Control Plane's decisions can indirectly limit potential damage zones by enforcing segmented access to network resources, its primary role should not be confused with the outcomes of its policy enforcement. The Control Plane does not directly ensure the efficient transmission of data — this is a misconception, as that is the role of the Data Plane.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following terms refers to an authorization model that allows resource owners to grant or deny permissions based on their own judgment?
RBAC
DAC
OTP
(mTLS) authentication

Answer explanation

OBJ: 1.2 - DAC (Discretionary access control) is a model where resource owners have the discretion to determine who can access specific resources and the actions they can perform. Mutual TLS (mTLS) authentication involves both client and server authenticating each other using certificates for secure communication. RBAC (Role-based access control) grants access based on the role of the user, not on the user's individual identity. OTP (One-time password) is an authentication mechanism where a unique password is valid for only one login session.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following terms refers to the practice of minimizing the potential attack surface within an organization's network?
Zero Trust
Threat scope reduction
Physical security
Gap analysis

Answer explanation

OBJ: 1.2 - Threat scope reduction refers to the proactive steps and strategies taken to reduce the potential areas of attack within a system or network. By limiting the avenues that attackers can exploit, organizations can more effectively secure their assets. Zero Trust is a security concept that advocates for not trusting any entity inside or outside the organization's perimeter by default. It emphasizes the need for continuous verification and validation. A gap analysis identifies the differences between the current state of a system or process and its desired future state, providing a roadmap for achieving those desired outcomes. Physical security focuses on measures designed to protect the physical assets of an organization, such as buildings, devices, and personnel, from harm and unauthorized access.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which characteristic of blockchain technology ensures that the risk associated with having a single point of failure or compromise is mitigated?
Homomorphic encryption
Decentralization
Time-stamping
Digital certificate rotation

Answer explanation

OBJ: 1.4 - One of the most important characteristics of blockchain is its decentralized nature, distributing the ledger across a peer-to-peer network, thus eliminating a single point of failure.  Homomorphic encryption allows for computations on ciphertext, without the need for decryption first. Digital certificate rotation is the practice of changing digital certificates at regular intervals. While blockchain blocks often include time stamps, this feature doesn't protect against a singular point of compromise.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Florence is explaining the cryptographic system to her boss. He finds it very confusing and keeps saying that it all seems like smoke and mirrors. He doesn't think that the system can be relied on. Florence then explains that there is a piece of hardware within the system that can be always and completely relied upon, setting up a chain of reliable identities. It is the foundation of the cryptographic system. What is Florence describing?
Root of Trust
Certificate Authorities
Certificate Revocation Lists
Online Certificate Status Protocol

Answer explanation

OBJ: 1.4 - Root of Trust (RoT) is a source that can always be trusted. It is the foundation of a cryptographic system and is the central point of the chain of trust within that system.  It can be a piece of hardware (a Hardware Root of Trust) or software based.  It is important in PKI, but it doesn't provide digital certificates. Certificate Authorities (CAs) are trusted entities that issue and manage security credentials and public keys for message encryption. This does not describe the source that can always be trusted within a cryptographic system. Certificate Revocation Lists (CRLs) are lists of certificates that have been revoked by a Certificate Authority before their scheduled expiration date. This does not describe the source that can always be trusted within a cryptographic system. Online Certificate Status Protocol (OCSP) is an internet protocol used for obtaining the revocation status of a digital certificate. This does not describe the source that can always be trusted within a cryptographic system.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following terms refers to ensuring that information remains unchanged from its source and has not been improperly modified?
Availability
Integrity
Authentication
Confidentiality

Answer explanation

OBJ: 1.2 - Integrity ensures that information remains accurate and reliable over its entire life cycle, safeguarding against unauthorized alterations. Authentication confirms the identity of a user or system before granting access to resources. Confidentiality protects information from unauthorized access and disclosure. Availability ensures that systems and data are available to authorized users when they need them.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Albert, an IT technician, must implement a security measure to monitor and control incoming and outgoing network traffic based on predetermined security rules. Which of the following should the technician implement?
Firewall
Background checks
Acceptable use policy
Security awareness training

Answer explanation

OBJ: 1.1 - A Firewall is a technical security control that monitors and controls incoming and outgoing network traffic based on predetermined security rules. It can help prevent unauthorized access to a network or system. Background checks are an administrative security control that involves verifying the identity and history of employees or contractors. While it can help prevent insider threats, it does not directly monitor or control network traffic. An acceptable use policy is an administrative security control that outlines the acceptable use of company resources, including computer systems and networks. While it can help prevent misuse of resources, it does not directly monitor or control network traffic. Security awareness training is an administrative security control that involves educating employees about security threats and how to avoid them. While it is important, it does not directly monitor or control network traffic.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?