Security Pro Chapter 1 – 1.1.4 Practice Questions

Your page rank:

Total word count: 442
Pages: 2

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

A user copies files from her desktop computer to a USB flash device and puts the device into her pocket. Which of the following security risks is most pressing?
O Non-repudiation
O Availability
O Confidentiality
O Integrity

Confidentiality

Smart phones with cameras and internet capabilities pose a risk to which security concept?
O Confidentiality
O Non-repudiation
O Integrity
O Availability

Confidentiality

By definition, which security concept ensures that only authorized parties can access data?
O Non-repudiation
O Integrity
O Authentication
O Confidentiality

Confidentiality

Your computer system is a participant in an asymmetric cryptography system. You’ve created a message to send to another user. Before transmission, you hash the message and encrypt the hash using your private key. You then attach this encrypted hash to your message as a digital signature before sending it to the other user. In this example, what protection does the hashing activity’ provide?
O Integrity
O Availability
O Non-repudiation
O Confidentiality

Integrity

Which of the following is an example of an internal threat?
O A server back door allows an attacker on the internet to gain access to the intranet site.
O A water pipe in the server room breaks.
O A delivery man is able to walk into a controlled area and steal a laptop.
O A user accidentally deletes the new product designs.

A user accidentally deletes the new product design

What is the greatest threat to the confidentiality of data in most secure organizations?
O USB devices
O Operator error
O Hacker intrusion
O Malware

USB Devices

Which of the following is the correct definition of a threat?
O Absence or weakness of a safeguard that could be exploited
O Any potential danger to the confidentiality, integrity, or availability of information or systems
O Instance of exposure to losses from an attacker
O The likelihood of an attack taking advantage of a vulnerability

Any potential danger to the confidentiality, integrity, or availability of information or systems

Which of the following is an example of a vulnerability?
O Unauthorized access to confidential resources
O A misconfigured server
O Virus infection
O Denial of servÄce attack

A misconfigured server

By definition, which security concept uses the ability to prove that a sender sent an encrypted message?
O Authentication
O Non-repudiation
O Integrity
O Privacy

Non-repudiation

Which of the following is not a valid concept to associate with integrity?
O Prevent the unauthorized change of data
O Protect your environment so it maintains the highest source of truth
O Control access to resources to prevent unwanted access
O Ensure that your systems record the real information when collecting data

Control access to resources to prevent unwanted access

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending