1. Question
What are two methods that ensure confidentiality? (Choose two.) Select one or more:
- integrity
- availability
- authentication
- authorization
- nonrepudiation
- encryption
- Feedback
Explanation:
Confidentiality means viewing of information only for those who need to know. This can be accomplished by encrypting data and authenticating users who request access.
2. Question
What name is given to any changes to the original data such as users manually modifying data,
programs processing and changing data, and equipment failures? Select one:
- backup
- dissemination
- corruption
- deletion
- integrity
- modification
Explanation:
Modification involves changes to the original data and not complete deletion of the data.
3. Question
What is identified by the first dimension of the cybersecurity cube? Select one:
- knowledge
- rules
- goals
- safeguards
- tools
Explanation:
The first dimension of the cybersecurity sorcery cube identifies the goals or security principles required to protect the cyber world.
4. Question
What type of cybersecurity laws protect you from an organization that might want to share your sensitive data? Select one:
- confidentiality
- integrity
- authentication
- nonrepudiation
- privacy
Explanation:
Privacy laws control appropriate use of data and access to data.
5. Question
What three design principles help to ensure high availability? (Choose three.) Select one or more:
- ensure confidentiality
- detect failures as they occur
- use encryption
- check for data consistency
- provide for reliable crossover
- eliminate single points of failure
Explanation:
High availability systems typically include these three design principles.The correct answers are: detect failures as they occur, provide for reliable crossover, eliminate
single points of failure.
6. Question
What are the three foundational principles of the cybersecurity domain? (Choose three.) Select one or more:
- availability
- policy
- encryption
- confidentiality
- security
- integrity
Explanation:
Three foundational security principles are confidentiality, integrity and availability.
7. Question
What name is given to a storage device connected to a network? Select one:
- NAS
- RAID
- Cloud
- DASSAN
Explanation:
NAS refers to a storage device connected to a network that allows storage and retrieval of data from
a centralized location by authorized network users.
8. Question
What mechanism can organizations use to prevent accidental changes by authorized users? Select one:
- version control
- SHA-1
- backups
- hashing
- encryption
Explanation:
Version control ensures that two users cannot update the same object.
9. Question
What are three types of sensitive information? (Choose three.)Select one or more:
- business
- PII
- classified
- published
- public
- declassified
Explanation:
Sensitive information is information that would otherwise cause harm to a company or individual if
publicly disclosed.
10. Question
What service determines which resources a user can access along with the operations that a user can perform? Select one:
- authorization
- accounting
- authentication
- biometric
- token
Explanation:
Authorization determines whether a user has certain access privileges.
11. Question
What are three access control security services? (Choose three.)Select one or more:
- authentication
- repudiation
- availability
- access
- accounting
- authorization
Explanation:
This question refers to AAA authentication, authorization, and accountability.
12. Question
What are the three states of data? (Choose three.) Select one or more:
- suspended
- in-process
- in-cloud
- in-transit
- encrypted
- at rest
Explanation:
The protection of the cyber world requires cybersecurity professionals to account for the
safeguarding of data in-transit, in-cloud, and at rest.
13. Question
What are two common hash functions? (Choose two.) Select one or more:
- SHA
- Blowfish
- RC4
- MD5
- RSA
- ECC
Explanation:
SHA and MD5 use use complex mathematical algorithms to compute hash values.
14. Question
For the purpose of authentication, what three methods are used to verify identity? (Choose three.) Select one or more:
- something you do
- something you have
- something you know
- something you are
- where you are
Explanation:
The forms of authentication are something you know, have, or are. The correct answers are: something you know, something you have, something you are.
15. Question
What principle prevents the disclosure of information to unauthorized people, resources, and processes? Select one:
- availability
- nonrepudiation
- integrity
- confidentiality
- accounting
Explanation:
The security principle of confidentiality refers to the prevention of the disclosure of information to
unauthorized people, resources, and processes.
16. Question
What is a secure virtual network called that uses the public network? Select one:
- IDS
- NAC
- IPS
- VPN
- MPLS
- Firewall
Explanation:
The term VPN describes a virtual network that uses encryption to protect data when traveling across
Internet media.
17. Question
What two methods help to ensure system availability? (Choose two.) Select one or more:
- equipment maintenance
- system backups
- integrity checking
- system resiliency
- fire extinguishers
- up-to-date operating systems
Explanation:
System availability means: equipment maintenance, up-to-date operating systems
18. Question
Which two methods help to ensure data integrity? (Choose two.) Select one or more:
- data consistency checks
- privacy
- authorization
- repudiation
- availability
- hashing
Explanation:
Data integrity systems include one of the two data integrity methods: hashing, data consistency checks.
19. Question
What is a method of sending information from one device to another using removable media? Select one:
- wireless
- LAN
- wired
- infrared
- sneaker net
- packet
Explanation:
Sneaker net refers to hand delivering the removable data.
20. Question
What three tasks are accomplished by a comprehensive security policy? (Choose three.) Select one or more:
- vagueness
- gives security staff the backing of management
- useful for management
- sets rules for expected behavior
- defines legal consequences of violations
- is not legally binding
Explanation:
Policy sets the establishment of rules and guidelines for the business.