Testout LabSim Security Pro, 1.1 Exam Questions

Your page rank:

Total word count: 721
Pages: 3

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

A user copies files from her desktop computer to a USB flash and puts device into her purse. Which of the following security goals is most @ risk?

A. Availability
B. Confidentiality
C. Integrity
D. Non-repudiation

B. Confidentiality Ensures data is not disclosed to unintended persons. Ex. Stolen purse, info is now out in wrong hands.

Smart Phones with cameras & internet access pose a risk to which security goal?

A. Availability
B. Confidentiality
C. Integrity
D. Non-repudiation

B. Confidentiality Ex. Taking a picture of the administrator password so you can remember it later, save data on phone like USB. Stolen info can be given to other users.

Which security concept ensures that only authorized parties can access data?

A. Availability
B. Confidentiality
C. Integrity
D. Non-repudiation

A. Confidentiality Confidentiality ensures that only authorized parties can access data.

Your computer system is a participant in an asymmetric cryptography system. You crafted a message to send to another user. Before transmission, you hash the message, then encrypt the hash using your private key. You then attach this encrypted hash to your message as a digital signatre before sending it to the user. What protection does hashing provide?

A. Availability
B. Confidentiality
C. Integrity
D. Non-repudiation

C. Integrity Hashing of any sort at any time including within a digital signature provides data integrity.

Which of the following is an internal threat?

A. Server backdoor allows attacker on internet to gain access to intranet site.
B. Student walks into controlled area and steals laptop.
C. Water pipe in server room breaks.
D. User accidentally deletes new product designs.

D. User accidentally deletes new product designs. Internal threats are intentional or accidental acts. May include: -Theft/fraud/sabotage -Intentional/unintentional destruction/altering data -Disclosing info, snooping/espionage

What is the greatest threat to the confidentiality of data in most secure organizations?

A. USB devices
B. Malware
C. Hacker
D. Operator error

A. USB devices Threatens confidentiality of data (getting in wrong hands) because data can be copied and become portable.

What is the correct definition of threat?

A. Absence/weakness of a safeguard that could be exploited.
B. Instance of being exposed to losses from an attacker.
C. Any potential danger to the confidentiality, integrity, or availability of information or systems.
D. Likelihood of an attack taking advantage of vulnerability.

C. Any potential danger to the confidentiality, integrity, or availability of information or systems. -Threat is Any potential danger to the confidentiality, integrity, or availability of information or systems.

Which of the following is an example of a vulnerability?

A. Virus
B. DDOS
C. Unauthorized access to confidential resources
D. Misconfigured server

D. Misconfigured server A vulnerability is the absence/weakness of a safeguard that could be exploited.

Which of the following is not a valid concept of integrity?

A. Prevent unauthorized change of data
B. Protect environment so it maintains highest source of truth.
C. Ensure systems record the real info when collecting data
D. Control access to resources to prevent unwanted access.

D. Control access to resources to prevent unwanted access. Integrity concepts include prevention of unauthorized change, ensuring data is true reflection of reality and maintaining the highest source of truth.

When a cryptography system is used to protect the confidentiality of data, what is actually protected?

A. Unauthorized users are prevented from viewing/accessing the resource.
B. The encrypted data is restricted from being transmitted.
C. The data is available for access whenever authorized users need it.
D. The data is protected from corruption/change.

A. Unauthorized users are prevented from viewing/accessing the resource. Confidentiality is the protection of disclosure to unauthorized users.

By definition, which security concept uses the ability to prove that a sender sent an encrypted message?

A. Privacy
B. Integrity
C. Non-repudiation
D. Authentication

C. Non-repudiation In cryptography solutions, It can be proven that only the sender is able to initiate communication, thus they cannot repute that they originated a message.

The company network is protected by a firewall, IDS, and tight access controls. All of the files on this protected network are copied to tape every 24 hours. The backup solution imposed on this network is designed to provide protection for what security service?

A. Confidentiality
B. Non-Repudiation
C. Integrity
D.Availability

D.Availability Backups provide protection for availability. You gain insurance against data corruption/loss.

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending