- Information
- AI Chat
Was this document helpful?
UGRD IT6206A 2123T Cybersecurity Essentials Final Quiz
Course: Advanced Database Management Systems (ADM302)
63 Documents
Students shared 63 documents in this course
University: AMA Computer University
Was this document helpful?
UGRD-IT6206A-2123T Cybersecurity Essentials Final Quiz
The team is in the process of performing a risk analysis on the database services. The
information collected includes the initial value of these assets, the threats to the assets and the
impact of the threats. What type of risk analysis is the team performing by calculating the annual
loss expectancy?
Answer: quantitative analysis
Which cybersecurity weapon scans for use of default passwords, missing patches, open ports,
misconfigurations, and active IP addresses?
Answer: vulnerability scanners
The X.509 standards defines which security technology?
Answer: digital certificates
An organization allows employees to work from home two days a week. Which technology
should be implemented to ensure data confidentiality as data is transmitted?
Answer: VPN
Keeping data backups offsite is an example of which type of disaster recovery control?
Answer: preventive
What is it called when an organization only installs applications that meet its guidelines, and
administrators increase security by eliminating all other applications?
Answer: asset standardization
Which access control should the IT department use to restore a system back to its normal
state?
Answer: corrective
A VPN will be used within the organization to give remote users secure access to the corporate
network. What does IPsec use to authenticate the origin of every packet to provide data integrity
checking?
Answer: HMAC
Which data state is maintained in NAS and SAN services?
Answer: stored data
Before data is sent out for analysis, which technique can be used to replace sensitive data in
nonproduction environments to protect the underlying information?
Answer: data masking substitution
What technology should be implemented to verify the identity of an organization, to authenticate
Students also viewed
Related documents
- Invitattion Letter of npcaca
- Week 002 Theories and Pioneering Ideas in the Management
- f wgherherhdh eruheyhrdhd r Which of the following is one of the major challenges with nanotechnology given by the article? Select one: a. Lack of researchers for this form of technology b. Laws th
- 01 x01 Basic concepts - Discover the best homework help resource for TAX a
- [ Amaleaks. Blogspot.COM] Philosophy Week 11-20 Grade 11-1
- 1 Measurement sudusd90st aa0 biuau8tsiajosia98ysas=aospsjckhugx ysy7sgdisu989sdsssffssdsdsss