Deck 2: Cybersecurity: Fundamentals

Full screen (f)
exit full mode
Question
The following technology solution represents an example of the 'simplicity' principle EXCEPT:

A) Relying on a single sign-on based password manager
B) Enabling automatic full disk encryption to protect data with no productivity sacrifice
C) Automated data and file backups
D) Deploying all VPN connections in the transport mode
E) Using passphrases rather than passwords
Use Space or
up arrow
down arrow
to flip the card.
Question
The following figure demonstrates the ________ principle in security. <strong>The following figure demonstrates the ________ principle in security.  </strong> A) Limiting B) Simplicity C) Layering D) Defense-in-depth E) Hiding <div style=padding-top: 35px>

A) Limiting
B) Simplicity
C) Layering
D) Defense-in-depth
E) Hiding
Question
Which CORRECTLY pairs a security layer and an available technology in realizing the defense-in-depth principle?

A) Data security -- Access Control List (ACL) on border routers
B) Application security -- Hardening intermediary devices
C) Host security -- Anti-virus protection
D) Internal network security -- Corporate-wide data encryption
E) Perimeter security -- Network segmentation (e.g., subnets, VLANs)
Question
Which is NOT a primary security requirement?

A) confidentiality (privacy)
B) data integrity
C) authentication
D) access control
E) spoofing detection
Question
_____ is a process that validates "you are the person/system you claim to be."

A) Address filtering
B) Challenging
C) Certification
D) Authentication
E) Authorization
Question
In realizing the defense-in-depth principle, the perimeter security technologies of a business organization include the following EXCEPT:

A) Border firewalls
B) Corporate file access control
C) Access Control List (ACL) on border routers
D) Demilitarized zone (DMZ)
E) Proxy servers
Question
The defense-in-depth principle may include security measures of the following layers. Which layer is LEAST relevant?

A) Application security
B) External network security
C) Host security
D) Internal network security
E) Perimeter security
Question
The following elements/activities cut across all security layers in realizing defense-in-depth EXCEPT:

A) Corporate-wide data encryption
B) Regulatory compliance self-assessment
C) Security policies & procedures
D) Security awareness & training
E) Information security self-assessment
Question
Maintaining a reliable backup system of corporate database satisfies what aspect of security requirements?

A) Confidentiality
B) Data integrity
C) Authentication
D) Authorization
E) Availability
Question
Which of the following is NOT a technology solution intended for authentication?

A) Password and passphrase
B) Access control list (ACL)
C) Digital signature and digital certificate
D) Biometric solutions (e.g., fingerprints).
E) Security token
Question
Maintaining data privacy achieves the _________ aspect of security requirement.

A) confidentiality
B) integrity
C) authentication
D) access control
E) reliability
Question
The following figure is an example of ___________ attack. <strong>The following figure is an example of ___________ attack.  </strong> A) social engineering B) denial of service C) malware D) fingerprinting E) man-in-the-middle <div style=padding-top: 35px>

A) social engineering
B) denial of service
C) malware
D) fingerprinting
E) man-in-the-middle
Question
Below email is an example of _________: <strong>Below email is an example of _________:  </strong> A) sniffing B) spoofing C) monitoring D) phishing E) scanning <div style=padding-top: 35px>

A) sniffing
B) spoofing
C) monitoring
D) phishing
E) scanning
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/13
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 2: Cybersecurity: Fundamentals
1
The following technology solution represents an example of the 'simplicity' principle EXCEPT:

A) Relying on a single sign-on based password manager
B) Enabling automatic full disk encryption to protect data with no productivity sacrifice
C) Automated data and file backups
D) Deploying all VPN connections in the transport mode
E) Using passphrases rather than passwords
D
2
The following figure demonstrates the ________ principle in security. <strong>The following figure demonstrates the ________ principle in security.  </strong> A) Limiting B) Simplicity C) Layering D) Defense-in-depth E) Hiding

A) Limiting
B) Simplicity
C) Layering
D) Defense-in-depth
E) Hiding
A
3
Which CORRECTLY pairs a security layer and an available technology in realizing the defense-in-depth principle?

A) Data security -- Access Control List (ACL) on border routers
B) Application security -- Hardening intermediary devices
C) Host security -- Anti-virus protection
D) Internal network security -- Corporate-wide data encryption
E) Perimeter security -- Network segmentation (e.g., subnets, VLANs)
C
4
Which is NOT a primary security requirement?

A) confidentiality (privacy)
B) data integrity
C) authentication
D) access control
E) spoofing detection
Unlock Deck
Unlock for access to all 13 flashcards in this deck.
Unlock Deck
k this deck
5
_____ is a process that validates "you are the person/system you claim to be."

A) Address filtering
B) Challenging
C) Certification
D) Authentication
E) Authorization
Unlock Deck
Unlock for access to all 13 flashcards in this deck.
Unlock Deck
k this deck
6
In realizing the defense-in-depth principle, the perimeter security technologies of a business organization include the following EXCEPT:

A) Border firewalls
B) Corporate file access control
C) Access Control List (ACL) on border routers
D) Demilitarized zone (DMZ)
E) Proxy servers
Unlock Deck
Unlock for access to all 13 flashcards in this deck.
Unlock Deck
k this deck
7
The defense-in-depth principle may include security measures of the following layers. Which layer is LEAST relevant?

A) Application security
B) External network security
C) Host security
D) Internal network security
E) Perimeter security
Unlock Deck
Unlock for access to all 13 flashcards in this deck.
Unlock Deck
k this deck
8
The following elements/activities cut across all security layers in realizing defense-in-depth EXCEPT:

A) Corporate-wide data encryption
B) Regulatory compliance self-assessment
C) Security policies & procedures
D) Security awareness & training
E) Information security self-assessment
Unlock Deck
Unlock for access to all 13 flashcards in this deck.
Unlock Deck
k this deck
9
Maintaining a reliable backup system of corporate database satisfies what aspect of security requirements?

A) Confidentiality
B) Data integrity
C) Authentication
D) Authorization
E) Availability
Unlock Deck
Unlock for access to all 13 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following is NOT a technology solution intended for authentication?

A) Password and passphrase
B) Access control list (ACL)
C) Digital signature and digital certificate
D) Biometric solutions (e.g., fingerprints).
E) Security token
Unlock Deck
Unlock for access to all 13 flashcards in this deck.
Unlock Deck
k this deck
11
Maintaining data privacy achieves the _________ aspect of security requirement.

A) confidentiality
B) integrity
C) authentication
D) access control
E) reliability
Unlock Deck
Unlock for access to all 13 flashcards in this deck.
Unlock Deck
k this deck
12
The following figure is an example of ___________ attack. <strong>The following figure is an example of ___________ attack.  </strong> A) social engineering B) denial of service C) malware D) fingerprinting E) man-in-the-middle

A) social engineering
B) denial of service
C) malware
D) fingerprinting
E) man-in-the-middle
Unlock Deck
Unlock for access to all 13 flashcards in this deck.
Unlock Deck
k this deck
13
Below email is an example of _________: <strong>Below email is an example of _________:  </strong> A) sniffing B) spoofing C) monitoring D) phishing E) scanning

A) sniffing
B) spoofing
C) monitoring
D) phishing
E) scanning
Unlock Deck
Unlock for access to all 13 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 13 flashcards in this deck.