D488 ITAS 62 91 Cybersecurity Architecture & Engineering LATEST COMPLETE OA GUIDE 2024 1. Multiple Choice: Which of the following is considered a foundational principle of cybersecurity architecture? a) Confidentiality b) Redundancy c) Scalability d) All of the above Answer : d) All of the above Rationale: Confidentiality, redundancy, and scalability are all foundational principles that support the integrity and functionality of cybersecurity architectures. 2. True/False: In cybersecurity, 'Defense in Depth' refers to the practice of layering multiple security measures to protect data. Answer : True Rationale: 'Defense in Depth' is a strategy that emplo ys a series of defensive mechanisms to protect data and prevent the advance of an attack. 3. Fill -in-the-Blank: The _______ model is a conceptual framework that outlines the processes for maintaining the integrity, confidentiality, and availability of inf ormation. Answer : CIA Triad Rationale: The CIA Triad stands for Confidentiality, Integrity, and Availability, which are the core principles of information security. 4. Multiple Choice: An Intrusion Detection System (IDS) is designed to: a) Prevent unauthorized access b) Detect and respond to unauthorized access c) Encrypt data transmissions d) Authenticate user identities Answer : b) Detect and respond to unauthorized access Rationale: An IDS is specifically designed to d etect unauthorized intrusions and, in many cases, take action to mitigate these threats. 5. True/False: Public Key Infrastructure (PKI) is only used for encrypting emails. Answer : False Rationale: PKI provides a framework for various services includ ing digital signatures, encryption, and authentication, not just email encryption. 6. Fill -in-the-Blank: The process of verifying the identity of a user or system is known as _______. Answer : Authentication Rationale: Authentication is the process of confirming the identity of a user or system before granting access to resources. 7. Multiple Choice: Which of the following is a common method for ensuring data integrity? a) Tokenization
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller EmilioOchieng. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $13.49. You're not tied to anything after your purchase.