1
WELL DETAILED ANSWERS|LATEST
PASS Which of the following is NOT a security principle?
- Confidentiality
- Integrity
- Availability
- Efficiency - ANSWER D.) The three security principles are confidentiality, integrity,
and availability.
What is the primary goal of cyber defense?
- To prevent unauthorized access to systems and data
- To maximize system efficiency
- To improve system performance
- To reduce maintenance costs - ANSWER A.) The primary goal of cyber defense is to
prevent unauthorized access to systems and data.
Which security principle is violated when a hacker gains unauthorized access to a system?
- Confidentiality
- Integrity
- Availability
- Efficiency - ANSWER A.) When a hacker gains unauthorized access to a system, it
violates the confidentiality security principle. 1 / 2
2
What is the purpose of a firewall?
- To prevent unauthorized access to a network
- To increase network speed
- To detect and remove viruses
- To encrypt network traffic - ANSWER A.) The purpose of a firewall is to prevent
unauthorized access to a network.
What is a honeypot?
- A vulnerable system designed to attract attackers
- A tool for detecting network vulnerabilities
- An encryption tool for securing data
- A type of virus that spreads through a network - ANSWER A.) A honeypot is a
vulnerable system designed to attract attackers.
What is the purpose of a vulnerability assessment tool like Nessus?
- To identify and prioritize security vulnerabilities in a network
- To encrypt network traffic
- To prevent unauthorized access to a network
- To monitor network traffic for security threats - ANSWER A.) The purpose of a
vulnerability assessment tool like Nessus is to identify and prioritize security vulnerabilities in a network.
Which of the following is a vulnerability assessment tool made by Rapid7?
- Nessus
- / 2