Respuesta correctas CIBERSEGURIDAD
.pdf
keyboard_arrow_up
School
Peruvian University of Applied Sciences *
*We aren’t endorsed by this school
Course
CIBERSEGUR
Subject
Information Systems
Date
May 28, 2024
Type
Pages
48
Uploaded by PrivateDangerPorpoise37
1. Which of these is the best definition of a security risk? O An instance of being exposed to losses © The likelihood of a threat source exploiting a vulnerability O Any potential danger that is associated with the exploitation of a vulnerability O Aweakness in a system @ Correct Correct! 2. Putting locks on a door is an example of which type of control? @® Preventative O Detective O Corrective O All of the above @ Correct Correct! 3. Which of the following defines a security threat? O A weakness in a system that could be exploited by a bad actor O The likelihood that the weakness in a system will be exploited O One instance of a weakness being exploited © Any potential danger capable of exploiting a weakness in a system @ Correct Correct!
4. Suspicious activity, like IP addresses or ports being scanned sequentially, is asign of which type of attack? O An IP spoofing attack O Adenial of service (DoS) attack @ A mapping attack O A phishing attack @ Correct Correct! 5. Anemail message that is encrypted, uses a digital signature and carries a hash value would address which aspects of the CIA Triad? @ Confidentiality and Integrity O Confidentiality and Availability O Integrity and Availability O Confidentiality, Integrity and Availability © Correct
6. Anorganization wants to restrict employee after-hours access to its systems so it publishes a policy forbidding employees to work outside of their assigned hours, and then makes sure the office doors remain locked on weekends. What two (2) types of controls are they using? (Select 2) Physical @ Correct Partially correct! This is 1 of the 2 correct answers Administrative @ Correct Partially correct! This is 1 of the 2 correct answers (J Technical O Operational 7. Which two factors contribute to cryptographic strength? (Select 2) The use of cyphers that have undergone public scrutiny Q) Correct Partially correct! This is 1 of the 2 correct answers The use of cyphers that are based on complex mathematical algorithms Q) Correct Partially correct! This is 1 of the 2 correct answers I:I The use of asymmetric cyphers [ The use of cyphers that have been kept very secret
8. Trying to break an encryption key by trying every possible combination of characters is called what? © A brute force attack O A known cyphertext attack O A social engineering attack O Arainbow table attack G) Correct Correct! 9. Which of the following describes the core goals of IT security? @® The CIATriad O The Open Web Application Security Project (OWASP) Framework O The Business Process Management Framework O The Information Technology Infrastructure Library (ITIL) framework Q) Correct Correct! 10. Which position conducts information security investigations for organizations to identify threats that could compromise the organization? O Information Security Architect O Vulnerability Assessor O Information Security Auditor © Information Security Analyst @ Correct Correct!
11. ITIL is best described as what? O Acollection of 1T Service Management controls O Privacy regulations for IT systems (9) Acollection of 1T Service Management best practices O A framework for the development of information systems audit procedures @ Correct Correct! 12. Alice sends a message to Bob that is intercepted by Trudy. Which scenario describes an availability violation? O Trudy deletes the message without forwarding it O Trudy changes the message and then forwards it on O Trudy reads the message © Trudy cannot read it because it is encrypted but allows it to be delivered to Bob in its original form ® Incorrect Incorrect, this material was covered in the course Cybersecurity Roles, Processes & Operating System Security, Week 2 - Examples & Principles of the CIA Triad Respuesta correcta: Trudy deletes the message without forwarding it
13. In cybersecurity, Accountability is defined as what? O The property of being genuine and verifiable O The first or original copy of a document or message O Being able to apply financial management to a process © Being able to map an action to an identity @ Correct Correct! 14. Multifactor authentication (MFA) requires more than one authentication method to be used before identity is authenticated. Which three (3) are authentication methods? (Select 3) Something a person has @ Correct Partially correct! This is 1 of the 3 correct answers Something a person is G) Correct Partially correct! This is 1 of the 3 correct answers Something a person knows @ Correct Partially correct! This is 1 of the 3 correct answers I:I Somewhere a person is located
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help