Deck 2: Cybersecurity: Fundamentals
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/13
Play
Full screen (f)
Deck 2: Cybersecurity: Fundamentals
1
The following technology solution represents an example of the 'simplicity' principle EXCEPT:
A) Relying on a single sign-on based password manager
B) Enabling automatic full disk encryption to protect data with no productivity sacrifice
C) Automated data and file backups
D) Deploying all VPN connections in the transport mode
E) Using passphrases rather than passwords
A) Relying on a single sign-on based password manager
B) Enabling automatic full disk encryption to protect data with no productivity sacrifice
C) Automated data and file backups
D) Deploying all VPN connections in the transport mode
E) Using passphrases rather than passwords
D
2
The following figure demonstrates the ________ principle in security. 
A) Limiting
B) Simplicity
C) Layering
D) Defense-in-depth
E) Hiding

A) Limiting
B) Simplicity
C) Layering
D) Defense-in-depth
E) Hiding
A
3
Which CORRECTLY pairs a security layer and an available technology in realizing the defense-in-depth principle?
A) Data security -- Access Control List (ACL) on border routers
B) Application security -- Hardening intermediary devices
C) Host security -- Anti-virus protection
D) Internal network security -- Corporate-wide data encryption
E) Perimeter security -- Network segmentation (e.g., subnets, VLANs)
A) Data security -- Access Control List (ACL) on border routers
B) Application security -- Hardening intermediary devices
C) Host security -- Anti-virus protection
D) Internal network security -- Corporate-wide data encryption
E) Perimeter security -- Network segmentation (e.g., subnets, VLANs)
C
4
Which is NOT a primary security requirement?
A) confidentiality (privacy)
B) data integrity
C) authentication
D) access control
E) spoofing detection
A) confidentiality (privacy)
B) data integrity
C) authentication
D) access control
E) spoofing detection
Unlock Deck
Unlock for access to all 13 flashcards in this deck.
Unlock Deck
k this deck
5
_____ is a process that validates "you are the person/system you claim to be."
A) Address filtering
B) Challenging
C) Certification
D) Authentication
E) Authorization
A) Address filtering
B) Challenging
C) Certification
D) Authentication
E) Authorization
Unlock Deck
Unlock for access to all 13 flashcards in this deck.
Unlock Deck
k this deck
6
In realizing the defense-in-depth principle, the perimeter security technologies of a business organization include the following EXCEPT:
A) Border firewalls
B) Corporate file access control
C) Access Control List (ACL) on border routers
D) Demilitarized zone (DMZ)
E) Proxy servers
A) Border firewalls
B) Corporate file access control
C) Access Control List (ACL) on border routers
D) Demilitarized zone (DMZ)
E) Proxy servers
Unlock Deck
Unlock for access to all 13 flashcards in this deck.
Unlock Deck
k this deck
7
The defense-in-depth principle may include security measures of the following layers. Which layer is LEAST relevant?
A) Application security
B) External network security
C) Host security
D) Internal network security
E) Perimeter security
A) Application security
B) External network security
C) Host security
D) Internal network security
E) Perimeter security
Unlock Deck
Unlock for access to all 13 flashcards in this deck.
Unlock Deck
k this deck
8
The following elements/activities cut across all security layers in realizing defense-in-depth EXCEPT:
A) Corporate-wide data encryption
B) Regulatory compliance self-assessment
C) Security policies & procedures
D) Security awareness & training
E) Information security self-assessment
A) Corporate-wide data encryption
B) Regulatory compliance self-assessment
C) Security policies & procedures
D) Security awareness & training
E) Information security self-assessment
Unlock Deck
Unlock for access to all 13 flashcards in this deck.
Unlock Deck
k this deck
9
Maintaining a reliable backup system of corporate database satisfies what aspect of security requirements?
A) Confidentiality
B) Data integrity
C) Authentication
D) Authorization
E) Availability
A) Confidentiality
B) Data integrity
C) Authentication
D) Authorization
E) Availability
Unlock Deck
Unlock for access to all 13 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following is NOT a technology solution intended for authentication?
A) Password and passphrase
B) Access control list (ACL)
C) Digital signature and digital certificate
D) Biometric solutions (e.g., fingerprints).
E) Security token
A) Password and passphrase
B) Access control list (ACL)
C) Digital signature and digital certificate
D) Biometric solutions (e.g., fingerprints).
E) Security token
Unlock Deck
Unlock for access to all 13 flashcards in this deck.
Unlock Deck
k this deck
11
Maintaining data privacy achieves the _________ aspect of security requirement.
A) confidentiality
B) integrity
C) authentication
D) access control
E) reliability
A) confidentiality
B) integrity
C) authentication
D) access control
E) reliability
Unlock Deck
Unlock for access to all 13 flashcards in this deck.
Unlock Deck
k this deck
12
The following figure is an example of ___________ attack. 
A) social engineering
B) denial of service
C) malware
D) fingerprinting
E) man-in-the-middle

A) social engineering
B) denial of service
C) malware
D) fingerprinting
E) man-in-the-middle
Unlock Deck
Unlock for access to all 13 flashcards in this deck.
Unlock Deck
k this deck
13
Below email is an example of _________: 
A) sniffing
B) spoofing
C) monitoring
D) phishing
E) scanning

A) sniffing
B) spoofing
C) monitoring
D) phishing
E) scanning
Unlock Deck
Unlock for access to all 13 flashcards in this deck.
Unlock Deck
k this deck