Which of these is the best definition of a security risk - the likelihood of a threat source
exploiting a vulnerability
Fancy bears and anonymous are examples of what - hacking organizations
Which of the following defines a security threat - any potential danger capable of
exploiting a weaknesses in a system
Implement a filter to remove flooded packets before they reach the host is a
countermeasure to which form of attack - a denial of service (dos) attack
In cybersecurity, authenticity is defined as what - the property of being genuine and
verifiable
Which type of access control is based upon the subjects clearance level and the objects
classification - mandatory access control (mac)
The encryption and protocols used to prevent unauthorized access to data are
examples of which type of access control - technical
A windows 10 user has 10 files exactly the same name. Which statement must be true
for these files - the files must be in different directories
Which component of the linux operating system interacts with your computers hardware
- the kernel
If cost is the primary concern, which type of cloud should be considered first - public
cloud
Which security concerns follow your workload even after it is successfully moved to the
cloud - (data security, disaster recovery/business continuity planning, identity and
access management, compliance)
All of the above
Which of the following is a self-regulating standard set up by the credit card industry in
the us - pci-dss
Which 2 of the following attack types target endpoints - spear phishing
Ad network
If an endpoint detection and response (edr) system detects that an endpoint does not
have a required patch installed, which statement best characterizes the actions it is able
, to take automatically - the endpoint can be quarantined from all network resources
except those that allow it to download and install the missing patch
Granting access to a user account only those privileges necessary to perform its
intended functions is known as what - the principle of least privileges
The windows security app available in windows 10 provides uses with which of the
following protections - (virus and threat protection, firewall and network protection,
family options - parental controls)
All of the above
Symmetric key encryption by itself ensures which of the following - confidentiality only
Which of the following practices helps assure the best results when implementing
encryption - chose a reliable and proven published algorithm
Which of these methods ensures the authentication, non-repudiation and integrity of a
digital communication - use of hashing
Why is symmetric key encryption the most common choice of methods to encryptic data
at rest - it is much faster than asymmetric key encryption
Which 3 of these are benefits you can realize from using a nat (network address
translation) router - allows statistic 1-to-1 mapping of local ip addresses to global ip
addresses
Allows internal ip addresses to be hidden from outside observers
Allows dynamic mapping of many local ip addresses to a smaller number of global ip
address only when they are needed
Which statement best describes configuring a nat router to use dynamic mapping -
unregistered ip addresses are mapped to registered ip addresses as they are needed
If a computer needs to send a message to a system that is not part of the local network,
where does it send the message - the networks default gateway address
Which are properties of a highly available system - redundancy, failover and monitoring
Which 3 of these statements about the tcp protocol are true - tcp packets are
reassembled by the receiving system in order in which they are sent
Tcp is connection-oriented
Tcp is more reliable than udp
An email message that is encrypted, uses a digital signature and carries a hash value
would address which aspects of cia triad - confidentiality and integrity
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller GEEKA. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $10.99. You're not tied to anything after your purchase.