SEC+ Revision Questions Introduction to Security Termonology Flashcards
Your company issues smartphones to employees for business use. Corporate policy dictates that all data stored on smartphones must be encrypted. To which fundamental security concept does this apply?
A. Confidentiality
B. Integrity
C. Availability
D. Accountability
Confidentiality
You are the network administrator for your company. Your manager has asked you to evaluate cloud backup solutions for remote branch offices. To which fundamental security concept does this apply?
A. Confidentiality
B. Integrity
C. Availability
D. Accountability
Availability
Your company requires all desktop computers to run a malware detection program twice daily. You configure your network so that only the specific digital version of the executable program that you specify is allowed to run. To which fundamental security concept does this apply?
A. Confidentiality
B. Integrity
C. Availability
D. Accountability
Integrity
You store personal documents and spreadsheets with a cloud provider. You would like your data to be available only to people having a special unlock key. What should you apply to your documents and spreadsheets?
A. File permissions
B. File hashing
C. File backup
D. File encryption
File encryption
You would like to send a confidential message to a family member through e-mail, but you have no way of encrypting the message. What alternative method would allow you to achieve your goal?
A. PKI
B. File hashing
C. Steganography
D. File permissions
Steganography
A corporate security policy emphasizes data confidentiality, and you must configure computing devices accordingly. What should you do? (Choose two.)
A. Install smartcard readers so users can identify themselves before sending important e-mail messages.
B. Enforce SD card encryption on smartphones issued to employees.
C. Configure a server failover cluster to ensure sensitive documents are always available.
D. Set file and folder permissions to control user file access.
Enforce SD card encryption on smartphones issued to employees
Set file and folder permissions to control user file access
Michel, an IT security expert, grants permissions to folders on a file server to allow Marketing users to modify Marketing documents. Which information security goal has been satisfied?
A. Confidentiality
B. Integrity
C. Availability
D. Safety
Confidentiality
You need to implement a solution that ensures data stored on a USB removable drive has not been tampered with. What should you implement?
A. File encryption
B. Steganography
C. File backup
D. File hashing
File hashing
Ana must send an important e-mail message to Glen, the director of Human Resources (HR). Corporate policy states that messages to HR must be digitally signed. Which of the following statements is correct?
A. Ana’s public key is used to create the digital signature.
B. Ana’s public key is used to verify the digital signature.
C. Glen’s private key is used to create the digital signature.
D. Glen’s private key is used to verify the digital signature.
Ana’s public key is used to verify the digital signature.
John is issuing a digital certificate for Carolyn’s computer. What can the certificate be used for? (Choose two.)
A. Setting permissions on sensitive files
B. Encrypting sensitive files
C. Verifying the computer’s identity to secure servers
D. Sending encrypted e-mail messages
Encrypting sensitive files
Verifying the computer’s identity to secure servers
Every month, Gene downloads and tests the latest software patches before applying them to production smart phones. To which security goal does this example apply?
A. Confidentiality
B. Integrity
C. Availability
D. Safety
Availability
You are evaluating public cloud-based e-mail hosting solutions. All vendors state that multiple servers are always running to ensure available mailboxes. What is this an example of?
A. Clustering
B. Steganography
C. Digital mailbox signatures
D. Mailbox duplicity
Clustering
Your network allows only trusted scripts to run on managed devices. You write a script that must run on all managed devices. What must you do? Place the following correct steps in proper order. (Choose three.)
A. Obtain a trusted digital certificate and install it on your computer.
B. Export the private key from your digital certificate to all managed devices.
C. Create the script.
D. Digitally sign the script.
Obtain a trusted digital certificate and install it on your computer.
Create the script.
Digitally sign the script.
Which of the following is depicted in Figure 2-1?
A. Authentication
B. Authorization
C. Nonrepudiation
D. Identification
Identification
You are the server administrator for your company. You are configuring disk storage as shown in Figure 2-2. To which of the following security controls does your disk configuration apply?
A. Nonrepudiation
B. Clustering
C. Fault tolerance
D. Hashing
Fault tolerance