Quiz - Introduction To Cybersecurity - Attempt Review

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

 FCF - Introduction to the Threat Landscape 2.

0 Self-Paced

Started on Sunday, December 24, 2023, 8:55 PM


State Finished
Completed on Sunday, December 24, 2023, 9:04 PM
Time taken 9 mins 7 secs
Points 8/8
Grade 100 out of 100
Feedback Congratulations, you passed!

Question 1 Which two elements of cybersecurity must be addressed when defending computer networks? (Choose two.)
Correct

1 points out of 1 Select one or more:


Physical access points
Computer technology vulnerabilities
Human behavior
Information left on desks or in public places

Question 2 What are the three principles of information security (InfoSec), also known as the CIA triad? (Choose three.)
Correct

1 points out of 1 Select one or more:


Confidentiality
Accountability
Incorruptibility
Integrity
Availability

Question 3 What are two categories of cybersecurity? (Choose two.)


Correct

1 points out of 1 Select one or more:


Critical infrastructure
Security accreditation for employees
Network security
Building access security

Question 4 In addition to the five categories of cybersecurity, what else do you need to consider when defending the cyber space?
Correct

1 points out of 1 Select one:


Computer code
People and processes
Executive strategic planning
ISO standards
Question 5 Which three principals make up the DAD triad? (Choose three.)
Correct

1 points out of 1 Select one or more:


Disclosure
Denial
Alteration
Anonymized data
Domain spoofing

Question 6 What is one of the first things that you need to do before implementing safeguards to information?
Correct

1 points out of 1 Select one:


Verify with government regulations if information requires protection.
Conduct criminal record checks on all employees.
Determine what information needs to be protected.
Carry out a data integrity check on all sensitive data.

Question 7 Which definition accurately describes information security (InfoSec)?


Correct

1 points out of 1 Select one:


The control of physical access to a building or room where sensitive data is stored, either digitally or physically.
The management of critical infrastructure, such as pipelines, electrical power grids, and data centers in the cloud.
The practice of protecting computer networks, devices, and digital information, whether on-premises or in the cloud.
The processes for preventing, detecting, and remediating attacks on sensitive information, both digital and physical.

Question 8 Which is the most accurate definition of authorization in cybersecurity?


Correct

1 points out of 1 Select one:


The practice of verifying activities on computer devices
The act of certifying that someone can perform an action
The process of controlling access to resources
The act of identifying and verifying a person or thing

You might also like