Exam 2: Cybersecurity: Fundamentals

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Below email is an example of _________: Below email is an example of _________:

Free
(Multiple Choice)
4.7/5
(32)
Correct Answer:
Verified

D

Maintaining a reliable backup system of corporate database satisfies what aspect of security requirements?

Free
(Multiple Choice)
4.8/5
(36)
Correct Answer:
Verified

E

The following elements/activities cut across all security layers in realizing defense-in-depth EXCEPT:

Free
(Multiple Choice)
4.9/5
(37)
Correct Answer:
Verified

A

In realizing the defense-in-depth principle, the perimeter security technologies of a business organization include the following EXCEPT:

(Multiple Choice)
4.9/5
(31)

Which of the following is NOT a technology solution intended for authentication?

(Multiple Choice)
4.9/5
(31)

Which is NOT a primary security requirement?

(Multiple Choice)
4.9/5
(26)

Maintaining data privacy achieves the _________ aspect of security requirement.

(Multiple Choice)
4.9/5
(41)

_____ is a process that validates "you are the person/system you claim to be."

(Multiple Choice)
4.7/5
(39)

The following technology solution represents an example of the 'simplicity' principle EXCEPT:

(Multiple Choice)
4.9/5
(34)

Which CORRECTLY pairs a security layer and an available technology in realizing the defense-in-depth principle?

(Multiple Choice)
4.8/5
(37)

The defense-in-depth principle may include security measures of the following layers. Which layer is LEAST relevant?

(Multiple Choice)
4.9/5
(34)

The following figure is an example of ___________ attack. The following figure is an example of ___________ attack.

(Multiple Choice)
4.9/5
(41)

The following figure demonstrates the ________ principle in security. The following figure demonstrates the ________ principle in security.

(Multiple Choice)
4.9/5
(45)
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)