Search Header Logo

SY0-001 Glossary Part 2

Authored by Jose Manuel Rios

Computers

University

Used 70+ times

SY0-001 Glossary Part 2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

35 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

What is the primary purpose of an HSM?

To store user passwords securely

To manage and secure cryptographic keys

To increase network bandwidth

To enhance application performance

2.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Which of the following components is typically included in an XDR solution?

Only network security tools

Database management systems

Traditional antivirus software

Endpoint detection and response (EDR), network traffic analysis, and security information and event management (SIEM)

3.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Which of the following is a key feature of NGFWs?

Deep packet inspection and application awareness

Basic packet filtering

Static rule management

Limited logging capabilities

Answer explanation

Next generation firewalls

4.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

What is the primary purpose of ECDSA?

To authenticate users via passwords

To provide a method for digital signatures

To generate secure symmetric keys

To encrypt data

Answer explanation

Elliptic Curve Digital Signature Algorithm (ECDSA)

5.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

What is the primary purpose of a MAC?

To provide key exchange mechanisms

To compress files

To ensure the integrity and authenticity of a message

To encrypt data

Answer explanation

Message Authentication

6.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

How is Annualized Loss Expectancy (ALE) calculated?

ALE = Single Loss Expectancy × Annual Rate of Occurrence

ALE = Total Risk × Total Exposure

ALE = Average Loss per Incident × Total Incidents

ALE = Total Assets - Total Liabilities

Answer explanation

ALE

7.

MULTIPLE CHOICE QUESTION

3 mins • 1 pt

Which of the following scenarios is an example of DAC?

A corporate server where access is based solely on user roles.

A file-sharing system where users can share files and set permissions for others.

A bank’s secure vault requiring biometric authentication.

A network firewall that blocks all incoming traffic except specific IP addresses.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?