Cybersecurity essentials chapter 2 quiz Welcome to Cybersecurity essentials chapter 2 quiz What are two methods that ensure confidentiality? (Choose two.) Select one or more: integrity availability authentication authorization nonrepudiation encryption What name is given to any changes to the original data such as users manually modifying data, programs processing and changing data, and equipment failures? Select one: backup dissemination corruption deletion integrity modification None What is identified by the first dimension of the cybersecurity cube? Select one: knowledge rules goals safeguards tools None What type of cybersecurity laws protect you from an organization that might want to share your sensitive data? Select one: confidentiality integrity authentication nonrepudiation privacy None What three design principles help to ensure high availability? (Choose three.) Select one or more: ensure confidentiality detect failures as they occur use encryption check for data consistency provide for reliable crossover eliminate single points of failure What are the three foundational principles of the cybersecurity domain? (Choose three.) Select one or more: availability policy encryption confidentiality security integrity What name is given to a storage device connected to a network? Select one: NAS RAID Cloud DASSAN None What mechanism can organizations use to prevent accidental changes by authorized users? Select one: version control SHA-1 backups hashing encryption None What are three types of sensitive information? (Choose three.)Select one or more: business PII classified published public declassified What service determines which resources a user can access along with the operations that a user can perform? Select one: authorization accounting authentication biometric token None What are three access control security services? (Choose three.)Select one or more: authentication repudiation availability access accounting authorization What are the three states of data? (Choose three.) Select one or more: suspended in-process in-cloud in-transit encrypted at rest What are two common hash functions? (Choose two.) Select one or more: SHA Blowfish RC4 MD5 RSA ECC For the purpose of authentication, what three methods are used to verify identity? (Choose three.) Select one or more: something you do something you have something you know something you are where you are What principle prevents the disclosure of information to unauthorized people, resources, and processes? Select one: availability nonrepudiation integrity confidentiality accounting None What is a secure virtual network called that uses the public network? Select one: IDS NAC IPS VPN MPLS Firewall None What two methods help to ensure system availability? (Choose two.) Select one or more: equipment maintenance system backups integrity checking system resiliency fire extinguishers up-to-date operating systems Which two methods help to ensure data integrity? (Choose two.) Select one or more: data consistency checks privacy authorization repudiation availability hashing What is a method of sending information from one device to another using removable media? Select one: wireless LAN wired infrared sneaker net packet None What three tasks are accomplished by a comprehensive security policy? (Choose three.) Select one or more: vagueness gives security staff the backing of management useful for management defines legal consequences of violations is not legally binding sets rules for expected behavior