Test 13 Flashcards

1
Q

Which of the answers listed below refers to a protocol used to set up secure connections and exchange of cryptographic keys in IPsec VPNs?

A

IKE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which part of the IPsec protocol suite provides data integrity and authentication but not encryption?

A

AH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which part of IPsec provides confidentiality, data integrity, and authentication?

A

ESP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the IPsec modes provides entire packet encryption?

A

Tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An IPsec mode providing encryption only for the payload (the data part of the packet) is referred to as:

A

Transport mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The term “SD-WAN” refers to a network technology that uses software to manage and optimize network connections that extend over large geographic areas.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following answers refers to a cybersecurity framework that combines network and security functions into a single cloud-based service?

A

SASE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the answers listed below refers to any type of information pertaining to an individual that can be used to uniquely identify that person?

A

PII

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following regulates personal data privacy of the EU citizens?

A

GDPR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The US Health Insurance Portability and Accountability Act (HIPAA) provides privacy protection for:

A

PHI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The purpose of PCI DSS is to provide protection for:

A

Credit cardholder data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the answers listed below refer(s) to encryption method(s) used to protect data at rest? (Select all that apply)

A

FDE
SED
EFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Encryption methods used to protect data in transit include: (Select all that apply)

A

VPN
IPsec
TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following data states typically requires data to be processed in an unencrypted form?

A

Data in use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the answers listed below refer to examples of non-human readable data types? (Select 2 answers)

A

Binary code
Machine language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following answers refers to an individual or role responsible for overseeing and ensuring compliance with data protection laws and policies within an organization?

A

DPO

17
Q

A mobile device’s built-in functionality enabling the usage of locator applications is known as:

A

GPS

18
Q

Which of the answers listed below refers to a technology that provides control over the usage of a mobile device within a designated area?

A

Geofencing

19
Q

Which of the following converts plaintext data into ciphertext using an algorithm and a key?

A

Encryption

20
Q

Which of the answers listed below refers to a technique that enables converting input data into a fixed-size string, making it difficult to reverse or retrieve the original data?

A

Hashing

21
Q

Which of the following answers refer to data masking? (Select 2 answers)

A

Replaces sensitive data with fictitious or modified data while retaining its original format ( Missed)
Allows for data manipulation in environments where the actual values are not needed

22
Q

Which of the answers listed below refers to a situation where sensitive data is stored in a separate location and can be retrieved with a non-sensitive replacement that can also be processed just like the original data without the risk of revealing the contents of original data?

A

Tokenization

23
Q

Which of the following modifies data or code to make it difficult to understand or reverse-engineer, but without necessarily encrypting or hiding the data?

A

Obfuscation

24
Q

Which of the answers listed below refer to the advantages of segmentation as a method for securing data? (Select 3 answers)

A

Enhances security by limiting the spread of cyberattacks ( Missed)
Helps organizations comply with data regulatory requirements by isolating and protecting specific data types ( Missed)
Provides better control over user access to sensitive data

25
Q

ACL, FACL, DAC, MAC, and RBAC are all access control mechanisms that can be used to manage user permissions and protect the confidentiality, integrity, and availability of data.

A

True