Deck 2: Cybersecurity: Fundamentals
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
سؤال
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/13
العب
ملء الشاشة (f)
Deck 2: Cybersecurity: Fundamentals
1
The following technology solution represents an example of the 'simplicity' principle EXCEPT:
A) Relying on a single sign-on based password manager
B) Enabling automatic full disk encryption to protect data with no productivity sacrifice
C) Automated data and file backups
D) Deploying all VPN connections in the transport mode
E) Using passphrases rather than passwords
A) Relying on a single sign-on based password manager
B) Enabling automatic full disk encryption to protect data with no productivity sacrifice
C) Automated data and file backups
D) Deploying all VPN connections in the transport mode
E) Using passphrases rather than passwords
D
2
The following figure demonstrates the ________ principle in security. 
A) Limiting
B) Simplicity
C) Layering
D) Defense-in-depth
E) Hiding

A) Limiting
B) Simplicity
C) Layering
D) Defense-in-depth
E) Hiding
A
3
Which CORRECTLY pairs a security layer and an available technology in realizing the defense-in-depth principle?
A) Data security -- Access Control List (ACL) on border routers
B) Application security -- Hardening intermediary devices
C) Host security -- Anti-virus protection
D) Internal network security -- Corporate-wide data encryption
E) Perimeter security -- Network segmentation (e.g., subnets, VLANs)
A) Data security -- Access Control List (ACL) on border routers
B) Application security -- Hardening intermediary devices
C) Host security -- Anti-virus protection
D) Internal network security -- Corporate-wide data encryption
E) Perimeter security -- Network segmentation (e.g., subnets, VLANs)
C
4
Which is NOT a primary security requirement?
A) confidentiality (privacy)
B) data integrity
C) authentication
D) access control
E) spoofing detection
A) confidentiality (privacy)
B) data integrity
C) authentication
D) access control
E) spoofing detection
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 13 في هذه المجموعة.
فتح الحزمة
k this deck
5
_____ is a process that validates "you are the person/system you claim to be."
A) Address filtering
B) Challenging
C) Certification
D) Authentication
E) Authorization
A) Address filtering
B) Challenging
C) Certification
D) Authentication
E) Authorization
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 13 في هذه المجموعة.
فتح الحزمة
k this deck
6
In realizing the defense-in-depth principle, the perimeter security technologies of a business organization include the following EXCEPT:
A) Border firewalls
B) Corporate file access control
C) Access Control List (ACL) on border routers
D) Demilitarized zone (DMZ)
E) Proxy servers
A) Border firewalls
B) Corporate file access control
C) Access Control List (ACL) on border routers
D) Demilitarized zone (DMZ)
E) Proxy servers
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 13 في هذه المجموعة.
فتح الحزمة
k this deck
7
The defense-in-depth principle may include security measures of the following layers. Which layer is LEAST relevant?
A) Application security
B) External network security
C) Host security
D) Internal network security
E) Perimeter security
A) Application security
B) External network security
C) Host security
D) Internal network security
E) Perimeter security
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 13 في هذه المجموعة.
فتح الحزمة
k this deck
8
The following elements/activities cut across all security layers in realizing defense-in-depth EXCEPT:
A) Corporate-wide data encryption
B) Regulatory compliance self-assessment
C) Security policies & procedures
D) Security awareness & training
E) Information security self-assessment
A) Corporate-wide data encryption
B) Regulatory compliance self-assessment
C) Security policies & procedures
D) Security awareness & training
E) Information security self-assessment
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 13 في هذه المجموعة.
فتح الحزمة
k this deck
9
Maintaining a reliable backup system of corporate database satisfies what aspect of security requirements?
A) Confidentiality
B) Data integrity
C) Authentication
D) Authorization
E) Availability
A) Confidentiality
B) Data integrity
C) Authentication
D) Authorization
E) Availability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 13 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following is NOT a technology solution intended for authentication?
A) Password and passphrase
B) Access control list (ACL)
C) Digital signature and digital certificate
D) Biometric solutions (e.g., fingerprints).
E) Security token
A) Password and passphrase
B) Access control list (ACL)
C) Digital signature and digital certificate
D) Biometric solutions (e.g., fingerprints).
E) Security token
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 13 في هذه المجموعة.
فتح الحزمة
k this deck
11
Maintaining data privacy achieves the _________ aspect of security requirement.
A) confidentiality
B) integrity
C) authentication
D) access control
E) reliability
A) confidentiality
B) integrity
C) authentication
D) access control
E) reliability
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 13 في هذه المجموعة.
فتح الحزمة
k this deck
12
The following figure is an example of ___________ attack. 
A) social engineering
B) denial of service
C) malware
D) fingerprinting
E) man-in-the-middle

A) social engineering
B) denial of service
C) malware
D) fingerprinting
E) man-in-the-middle
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 13 في هذه المجموعة.
فتح الحزمة
k this deck
13
Below email is an example of _________: 
A) sniffing
B) spoofing
C) monitoring
D) phishing
E) scanning

A) sniffing
B) spoofing
C) monitoring
D) phishing
E) scanning
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 13 في هذه المجموعة.
فتح الحزمة
k this deck