100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
IBM CYBERSECURITY QUESTIONS AND ANSWERS $10.99   Add to cart

Exam (elaborations)

IBM CYBERSECURITY QUESTIONS AND ANSWERS

 5 views  0 purchase
  • Course
  • IBM
  • Institution
  • IBM

IBM CYBERSECURITY QUESTIONS AND ANSWERS

Preview 2 out of 7  pages

  • September 20, 2024
  • 7
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • IBM
  • IBM
avatar-seller
GEEKA
IBM CYBERSECURITY QUESTIONS AND ANSWERS

Which of these is the best definition of a security risk - the likelihood of a threat source
exploiting a vulnerability

Fancy bears and anonymous are examples of what - hacking organizations

Which of the following defines a security threat - any potential danger capable of
exploiting a weaknesses in a system

Implement a filter to remove flooded packets before they reach the host is a
countermeasure to which form of attack - a denial of service (dos) attack

In cybersecurity, authenticity is defined as what - the property of being genuine and
verifiable

Which type of access control is based upon the subjects clearance level and the objects
classification - mandatory access control (mac)

The encryption and protocols used to prevent unauthorized access to data are
examples of which type of access control - technical

A windows 10 user has 10 files exactly the same name. Which statement must be true
for these files - the files must be in different directories

Which component of the linux operating system interacts with your computers hardware
- the kernel

If cost is the primary concern, which type of cloud should be considered first - public
cloud

Which security concerns follow your workload even after it is successfully moved to the
cloud - (data security, disaster recovery/business continuity planning, identity and
access management, compliance)
All of the above

Which of the following is a self-regulating standard set up by the credit card industry in
the us - pci-dss

Which 2 of the following attack types target endpoints - spear phishing
Ad network

If an endpoint detection and response (edr) system detects that an endpoint does not
have a required patch installed, which statement best characterizes the actions it is able

, to take automatically - the endpoint can be quarantined from all network resources
except those that allow it to download and install the missing patch

Granting access to a user account only those privileges necessary to perform its
intended functions is known as what - the principle of least privileges

The windows security app available in windows 10 provides uses with which of the
following protections - (virus and threat protection, firewall and network protection,
family options - parental controls)
All of the above

Symmetric key encryption by itself ensures which of the following - confidentiality only

Which of the following practices helps assure the best results when implementing
encryption - chose a reliable and proven published algorithm

Which of these methods ensures the authentication, non-repudiation and integrity of a
digital communication - use of hashing

Why is symmetric key encryption the most common choice of methods to encryptic data
at rest - it is much faster than asymmetric key encryption

Which 3 of these are benefits you can realize from using a nat (network address
translation) router - allows statistic 1-to-1 mapping of local ip addresses to global ip
addresses
Allows internal ip addresses to be hidden from outside observers
Allows dynamic mapping of many local ip addresses to a smaller number of global ip
address only when they are needed

Which statement best describes configuring a nat router to use dynamic mapping -
unregistered ip addresses are mapped to registered ip addresses as they are needed

If a computer needs to send a message to a system that is not part of the local network,
where does it send the message - the networks default gateway address

Which are properties of a highly available system - redundancy, failover and monitoring

Which 3 of these statements about the tcp protocol are true - tcp packets are
reassembled by the receiving system in order in which they are sent
Tcp is connection-oriented
Tcp is more reliable than udp

An email message that is encrypted, uses a digital signature and carries a hash value
would address which aspects of cia triad - confidentiality and integrity

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller GEEKA. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $10.99. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

79650 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$10.99
  • (0)
  Add to cart