Deck 2: Cybersecurity: Fundamentals

ملء الشاشة (f)
exit full mode
سؤال
The following technology solution represents an example of the 'simplicity' principle EXCEPT:

A) Relying on a single sign-on based password manager
B) Enabling automatic full disk encryption to protect data with no productivity sacrifice
C) Automated data and file backups
D) Deploying all VPN connections in the transport mode
E) Using passphrases rather than passwords
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The following figure demonstrates the ________ principle in security. <strong>The following figure demonstrates the ________ principle in security.  </strong> A) Limiting B) Simplicity C) Layering D) Defense-in-depth E) Hiding <div style=padding-top: 35px>

A) Limiting
B) Simplicity
C) Layering
D) Defense-in-depth
E) Hiding
سؤال
Which CORRECTLY pairs a security layer and an available technology in realizing the defense-in-depth principle?

A) Data security -- Access Control List (ACL) on border routers
B) Application security -- Hardening intermediary devices
C) Host security -- Anti-virus protection
D) Internal network security -- Corporate-wide data encryption
E) Perimeter security -- Network segmentation (e.g., subnets, VLANs)
سؤال
Which is NOT a primary security requirement?

A) confidentiality (privacy)
B) data integrity
C) authentication
D) access control
E) spoofing detection
سؤال
_____ is a process that validates "you are the person/system you claim to be."

A) Address filtering
B) Challenging
C) Certification
D) Authentication
E) Authorization
سؤال
In realizing the defense-in-depth principle, the perimeter security technologies of a business organization include the following EXCEPT:

A) Border firewalls
B) Corporate file access control
C) Access Control List (ACL) on border routers
D) Demilitarized zone (DMZ)
E) Proxy servers
سؤال
The defense-in-depth principle may include security measures of the following layers. Which layer is LEAST relevant?

A) Application security
B) External network security
C) Host security
D) Internal network security
E) Perimeter security
سؤال
The following elements/activities cut across all security layers in realizing defense-in-depth EXCEPT:

A) Corporate-wide data encryption
B) Regulatory compliance self-assessment
C) Security policies & procedures
D) Security awareness & training
E) Information security self-assessment
سؤال
Maintaining a reliable backup system of corporate database satisfies what aspect of security requirements?

A) Confidentiality
B) Data integrity
C) Authentication
D) Authorization
E) Availability
سؤال
Which of the following is NOT a technology solution intended for authentication?

A) Password and passphrase
B) Access control list (ACL)
C) Digital signature and digital certificate
D) Biometric solutions (e.g., fingerprints).
E) Security token
سؤال
Maintaining data privacy achieves the _________ aspect of security requirement.

A) confidentiality
B) integrity
C) authentication
D) access control
E) reliability
سؤال
The following figure is an example of ___________ attack. <strong>The following figure is an example of ___________ attack.  </strong> A) social engineering B) denial of service C) malware D) fingerprinting E) man-in-the-middle <div style=padding-top: 35px>

A) social engineering
B) denial of service
C) malware
D) fingerprinting
E) man-in-the-middle
سؤال
Below email is an example of _________: <strong>Below email is an example of _________:  </strong> A) sniffing B) spoofing C) monitoring D) phishing E) scanning <div style=padding-top: 35px>

A) sniffing
B) spoofing
C) monitoring
D) phishing
E) scanning
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/13
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 2: Cybersecurity: Fundamentals
1
The following technology solution represents an example of the 'simplicity' principle EXCEPT:

A) Relying on a single sign-on based password manager
B) Enabling automatic full disk encryption to protect data with no productivity sacrifice
C) Automated data and file backups
D) Deploying all VPN connections in the transport mode
E) Using passphrases rather than passwords
D
2
The following figure demonstrates the ________ principle in security. <strong>The following figure demonstrates the ________ principle in security.  </strong> A) Limiting B) Simplicity C) Layering D) Defense-in-depth E) Hiding

A) Limiting
B) Simplicity
C) Layering
D) Defense-in-depth
E) Hiding
A
3
Which CORRECTLY pairs a security layer and an available technology in realizing the defense-in-depth principle?

A) Data security -- Access Control List (ACL) on border routers
B) Application security -- Hardening intermediary devices
C) Host security -- Anti-virus protection
D) Internal network security -- Corporate-wide data encryption
E) Perimeter security -- Network segmentation (e.g., subnets, VLANs)
C
4
Which is NOT a primary security requirement?

A) confidentiality (privacy)
B) data integrity
C) authentication
D) access control
E) spoofing detection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 13 في هذه المجموعة.
فتح الحزمة
k this deck
5
_____ is a process that validates "you are the person/system you claim to be."

A) Address filtering
B) Challenging
C) Certification
D) Authentication
E) Authorization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 13 في هذه المجموعة.
فتح الحزمة
k this deck
6
In realizing the defense-in-depth principle, the perimeter security technologies of a business organization include the following EXCEPT:

A) Border firewalls
B) Corporate file access control
C) Access Control List (ACL) on border routers
D) Demilitarized zone (DMZ)
E) Proxy servers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 13 في هذه المجموعة.
فتح الحزمة
k this deck
7
The defense-in-depth principle may include security measures of the following layers. Which layer is LEAST relevant?

A) Application security
B) External network security
C) Host security
D) Internal network security
E) Perimeter security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 13 في هذه المجموعة.
فتح الحزمة
k this deck
8
The following elements/activities cut across all security layers in realizing defense-in-depth EXCEPT:

A) Corporate-wide data encryption
B) Regulatory compliance self-assessment
C) Security policies & procedures
D) Security awareness & training
E) Information security self-assessment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 13 في هذه المجموعة.
فتح الحزمة
k this deck
9
Maintaining a reliable backup system of corporate database satisfies what aspect of security requirements?

A) Confidentiality
B) Data integrity
C) Authentication
D) Authorization
E) Availability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 13 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following is NOT a technology solution intended for authentication?

A) Password and passphrase
B) Access control list (ACL)
C) Digital signature and digital certificate
D) Biometric solutions (e.g., fingerprints).
E) Security token
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 13 في هذه المجموعة.
فتح الحزمة
k this deck
11
Maintaining data privacy achieves the _________ aspect of security requirement.

A) confidentiality
B) integrity
C) authentication
D) access control
E) reliability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 13 في هذه المجموعة.
فتح الحزمة
k this deck
12
The following figure is an example of ___________ attack. <strong>The following figure is an example of ___________ attack.  </strong> A) social engineering B) denial of service C) malware D) fingerprinting E) man-in-the-middle

A) social engineering
B) denial of service
C) malware
D) fingerprinting
E) man-in-the-middle
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 13 في هذه المجموعة.
فتح الحزمة
k this deck
13
Below email is an example of _________: <strong>Below email is an example of _________:  </strong> A) sniffing B) spoofing C) monitoring D) phishing E) scanning

A) sniffing
B) spoofing
C) monitoring
D) phishing
E) scanning
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 13 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 13 في هذه المجموعة.