
SY0-001 Glossary Part 2
Authored by Jose Manuel Rios
Computers
University
Used 70+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
35 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
What is the primary purpose of an HSM?
To store user passwords securely
To manage and secure cryptographic keys
To increase network bandwidth
To enhance application performance
2.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
Which of the following components is typically included in an XDR solution?
Only network security tools
Database management systems
Traditional antivirus software
Endpoint detection and response (EDR), network traffic analysis, and security information and event management (SIEM)
3.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
Which of the following is a key feature of NGFWs?
Deep packet inspection and application awareness
Basic packet filtering
Static rule management
Limited logging capabilities
Answer explanation
Next generation firewalls
4.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
What is the primary purpose of ECDSA?
To authenticate users via passwords
To provide a method for digital signatures
To generate secure symmetric keys
To encrypt data
Answer explanation
Elliptic Curve Digital Signature Algorithm (ECDSA)
5.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
What is the primary purpose of a MAC?
To provide key exchange mechanisms
To compress files
To ensure the integrity and authenticity of a message
To encrypt data
Answer explanation
Message Authentication
6.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
How is Annualized Loss Expectancy (ALE) calculated?
ALE = Single Loss Expectancy × Annual Rate of Occurrence
ALE = Total Risk × Total Exposure
ALE = Average Loss per Incident × Total Incidents
ALE = Total Assets - Total Liabilities
Answer explanation
ALE
7.
MULTIPLE CHOICE QUESTION
3 mins • 1 pt
Which of the following scenarios is an example of DAC?
A corporate server where access is based solely on user roles.
A file-sharing system where users can share files and set permissions for others.
A bank’s secure vault requiring biometric authentication.
A network firewall that blocks all incoming traffic except specific IP addresses.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?