Skip to document

UGRD IT6206A 2123T Cybersecurity Essentials Final Quiz

awesome have fun huhu nice and short give it a try
Course

Advanced Database Management Systems (ADM302)

63 Documents
Students shared 63 documents in this course
Academic year: 2022/2023
Uploaded by:
0followers
6Uploads
0upvotes

Comments

Please sign in or register to post comments.
Was this document helpful?

UGRD IT6206A 2123T Cybersecurity Essentials Final Quiz

Course: Advanced Database Management Systems (ADM302)

63 Documents
Students shared 63 documents in this course
Was this document helpful?
UGRD-IT6206A-2123T Cybersecurity Essentials Final Quiz
The team is in the process of performing a risk analysis on the database services. The
information collected includes the initial value of these assets, the threats to the assets and the
impact of the threats. What type of risk analysis is the team performing by calculating the annual
loss expectancy?
Answer: quantitative analysis
Which cybersecurity weapon scans for use of default passwords, missing patches, open ports,
misconfigurations, and active IP addresses?
Answer: vulnerability scanners
The X.509 standards defines which security technology?
Answer: digital certificates
An organization allows employees to work from home two days a week. Which technology
should be implemented to ensure data confidentiality as data is transmitted?
Answer: VPN
Keeping data backups offsite is an example of which type of disaster recovery control?
Answer: preventive
What is it called when an organization only installs applications that meet its guidelines, and
administrators increase security by eliminating all other applications?
Answer: asset standardization
Which access control should the IT department use to restore a system back to its normal
state?
Answer: corrective
A VPN will be used within the organization to give remote users secure access to the corporate
network. What does IPsec use to authenticate the origin of every packet to provide data integrity
checking?
Answer: HMAC
Which data state is maintained in NAS and SAN services?
Answer: stored data
Before data is sent out for analysis, which technique can be used to replace sensitive data in
nonproduction environments to protect the underlying information?
Answer: data masking substitution
What technology should be implemented to verify the identity of an organization, to authenticate