Common Security Concepts Quiz Flashcards

1
Q

The term “CIA” triad us used to describe the basic principles of information security.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following terms refer to the concept of confidentiality? (Select 2 answers)

A

Encryption
Access Control Methods
Steganography

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following terms refer(s) to the concept of integrity? (Select all that apply)

A

Hashing
Digital Signatures
Digital Certificates
Non-Repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following terms refer(s) to the concept of availability? (Select all that apply)

A

Redundancy
Fault tolerance
Load balancing
patch management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which term best describes a disgruntled emplyee abusing legitimate access to company’s internal resources?

A

Insider threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following statements does not match a typical description of nation states or state-funded groups identified as thread actors?

A

Typically classified as an internal threat

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following ansers refers to a vulnerability database?

A

CVE (Common Vulnerabilities and Exposures)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A type of attack aimed at exploiting vulnerability that is present in already released software but unknown to the software developer is called:

A

Zero-day attack

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following violates the principle of least privilege?

A

Improperly configured accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the security measure listed below would be effective against the malicious insider threat? (Select 3 answers)

A

DLP system (Data Loss Prevention)
Principle of least privilege
Usage auditing and review

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The term “Zero Trust” in the context of network security means that none of the devices operating within the boundaries of a given network can be trusted by default even if they were previously verified.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A concept of effective security posture employing multiple tools and different techniques to slow down an attacker is known as: (Select 2 answers)

A

Layers Security
Defense in depth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A lightly protected subnet (previously known as a DMZ) consisting of publicly available servers placed on the outside of the company’s firewall is called:

A

Screened Subnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the ansers listed below refers to a concept of having more than one person required to complete a given task?

A

Separation of duties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly