1
CORRECT WELL DETAILED ANSWERS|LATEST
PASS Which type of system is considered absolutely secure? - ANSWER A system that is shut off and disconnected from all networks.
Which concept of the CIA Triad is associated with reliability? - ANSWER Integrity
A malicious actor has breached the firewall with a reverse shell. Which side of the CIA triad is most affected? - ANSWER Confidentiality
A user changes a number in a dataset with a typo. Which side of the CIA triad is most affected? - ANSWER Integrity
What is an example of identification? - ANSWER Username
What are three forms of authentication? Choose three answers. - ANSWER 4 digit pin.Text of 6-digit number to phone. Fingerprint.
What is an example of identification? - ANSWER Email Address
What is an example of authentication? user name? mothers maiden name? write access? or email address? - ANSWER mother's maiden name
What is the final step in allowing access to resources? - ANSWER Authorization
- / 2
2
Which example demonstrates access control? - ANSWER Locking and unlocking the doors of your house.
Which type of access control model is a CAPTCHA an example of? - ANSWER Attribute- based
What is a sandbox? - ANSWER An isolated environment that protects a set of resources
Which characteristic falls under accountability? Utility? Interruption? Integrity? Identity? - ANSWER Identity
Which tool is used for vulnerability assessment? - ANSWER Qualys
Which standards apply to any financial entity policies? - ANSWER Gramm-Leech-Bliley
What company audits other companies for licensing requirements? - ANSWER BSA
Which term is synonymous with symmetric cryptography? - ANSWER Secret key cryptography
Which term is synonymous with asymmetric cryptography? - ANSWER Public key cryptography
What are hash functions used for? - ANSWER Determining whether the message has changed
Which method is used to protect data at rest? - ANSWER Encryption
- / 2