Question
Question 1 (1 point) Which of the following are examples of stored data? Please select all that apply. Question 1 options: A) The password login
Question 1 (1 point)
Which of the following are examples of stored data?
Please select all that apply.
Question 1 options:
|
| ||
|
| ||
|
| ||
|
|
Question 2 (1 point)
Which of the following is an example of data in transit?
Question 2 options:
|
| ||
|
| ||
|
|
Question 3 (1 point)
Saved
Stealing an un-encrypted hard disk is considered an attack on confidentiality.
Question 3 options:
A) True | |
B) False |
Question 4 (1 point)
Which of the following example is an attack on confidentiality?
Question 4 options:
|
| ||
|
| ||
|
|
Question 5 (1 point)
What are the three primary goals of security?
Please choose three.
Question 5 options:
|
| ||
|
| ||
|
| ||
|
| ||
|
|
Question 6 (1 point)
Alice agrees to a contract with Bob.
She later refuses to honor the contract.
What security sub-goal is she violating?
Question 6 options:
|
| ||
|
| ||
|
| ||
|
| ||
|
|
Question 7 (1 point)
What are other names for controls that may be used in this course?
Please select all that apply.
Question 7 options:
|
| ||
|
| ||
|
|
Question 8 (1 point)
Which types of vulnerabilities were exploited by the data leaks made by Edward Snowden (2013- 2014) and the Wikileaks by Chelsea Manning (2010)?
Please select all that apply.
Question 8 options:
|
| ||
|
| ||
|
|
Question 9 (1 point)
Which security subgoal is responsible for recording/tracking the activities of any entity?
Question 9 options:
|
| ||
|
| ||
|
| ||
|
|
Question 10 (1 point)
Which security subgoal requires the use of auditing or logging data about a user's actions?
Question 10 options:
|
| ||
|
| ||
|
| ||
|
| ||
|
|
Question 11 (1 point)
What security subgoal ensures that an entity cannot deny the occurrence of an event?
Question 11 options:
|
| ||
|
| ||
|
| ||
|
|
Question 12 (1 point)
All three categories of threats (physical, technological, and personnel) include unintentional and non-malicious threats.
Question 12 options:
A) True | |
B) False |
Question 13 (1 point)
Which of the following statements best captures the concept of defense in depth?
Question 13 options:
|
| ||
|
| ||
|
| ||
|
|
Question 14 (1 point)
Which of the following are examples of stored data?
Please select all that apply.
Question 14 options:
|
| ||
|
| ||
|
| ||
|
|
Question 15 (1 point)
Which security goal is supported by hashing?
Question 15 options:
|
| ||
|
| ||
|
| ||
|
|
Question 16 (1 point)
The three key goals of security are confidentiality, integrity, and authentication.
Question 16 options:
A) True | |
B) False |
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started