What is the security attribute that ensure data and services are available to Authorised user whenever required?
Cybersecurity Prologue Fresco Play MCQs Answers Show
Nội dung chính
Disclaimer: The main motive to provide this solution is to help and support those who are unable to do these courses due to facing some issue and having a little bit lack of knowledge. All of the material and information contained on this website is for knowledge and education purposes only. Try to understand these solutions and solve your Hands-On problems. (Not encourage copy and paste these solutions) Time to Evaluate Your Understanding! 1.Malware cannot inflict physical damage to systems.
Answer: 2)False 2.The type of malware that restricts access to the computer either by encrypting files on the hard drive or by displaying messages demanding a ransom is called __________.
Answer: 3)Ransomware 3._________ is commonly known for providing backdoor access to the system for malicious users.
Answer: 3)Trojans 4.The type of malware that tricks users by making them believe that their computer has been infected with a virus is called __________.
Answer: 4)Scareware 5._________ is a standalone software that does not need human help/host program to spread.
Answer: 4)Worm 6.An error message displayed on the system symbolizes virus infection.
Answer: 1)False 7.Which of the following malware is designed for advertising, such as pop-up screens?
Answer: 1)Adware 8.Which of the following is used to draw in users and infect them and deploy fast changing infrastructures?
Answer: 1)Malnet 9._________________ is a device infected by malware, which becomes part of a network of infected devices administered by a single attacker or attack group.
Answer: 1)Bot 10.The common term for a software that is considered as nonessential, whose implementation can compromise privacy or weaken the computer's security is called ___________.
Answer: 4)Potentially Unwanted Program 11.________ is designed to extract data from its host computer for marketing purposes.
Answer: 1)Spyware 12.What is PUP?
Answer: 3)Potentially Unwanted Program 13.The method of protecting programs, networks, and systems from digital attacks is commonly known as __________.
Answer: 4)Cybersecurity 14.Programs that are specifically designed to disrupt the performance of computers/networks are commonly known as __________.
Answer: 1)Ransomware
Time to Evaluate Your Understanding! 1.The security posture of an organization is defined by the ______ link in the chain.
Answer: 1)Weakest 2.Which of the following attributes is not a PII?
Answer: 3)IP Address 3.The security attribute that aims to achieve data privacy and protection against unauthorized disclosure is called ____________.
Answer: 4)Confidentiality 4.As an application of cryptography, digital Signatures and MACs can be used for _____________.
Answer: 1)Authentication 5.Threats can exploit assets if assets are not vulnerable.
Answer: 1)False 6.Which of the following is an attack against confidentiality?
Answer: 4)Man in the Middle Attack 7.Which of the following is an intangible asset?
Answer: 1)Trade Secrets 8.If a student gains unauthorized access to the student database and modifies his/her marks, what type of violation would it be?
Answer: 2)Both the options 9.Which of the following is an attack against availability?
Answer: 2)DoS Attack 10.Choose the correct option.
Answer: 3)Threat=Risk*Vulnerability 11.The type of attack in which the attacker intercepts the information in transit without altering it.
Answer: 3)Passive Attack 12.The process of converting a message to an unintelligible form with the help of an algorithm and a key is known as _______.
Answer: 2)Encryption 13.What is the practice and study of techniques for secure communication in the presence of third parties, commonly called?
Answer: 1)Cryptography 14.Which of the following security attribute is compromised when data or information is changed or tampered, either accidentally or maliciously?
Answer: 2)Integrity 15.Which of the following encryption methods is more suited for key exchange, non-repudiation, and authentication?
Answer: 1)Assymmetric Key Encryption 16.Passive attacks are considered a threat to _______.
Answer: 3)Confidentiality 17.Which of the following attack method aims to gather confidential information by deceiving the victim?
Answer: 1)Phishing 18.Which encryption method is more suitable for quickly encrypting large amounts of data?
Answer: 2)Symmetric Key Encryption Time to Evaluate Your Understanding! 1.A type of assessment that is often performed in a sandbox-virtual environment to prevent malware from actually infecting production systems is known as _________.
Answer: 2)Dynamic Analysis 2.A proactive process to predict potential risks efficiently.
Answer: 2)Threat Hunting 3.SABSA Framework is commonly represented as _______ SABSA matrix.
Answer: 4)6x6 4.A kind of a network attack, where an unauthorized person gains access to a network and remains there undetected for a long duration is called _________.
Answer: 3)Advanced Persistent Threats 5.A process by which potential vulnerabilities and threats can be recognized, enumerated, and prioritized from a hypothetical attacker's pov is called ___________.
Answer: 2)Threat Modeling 6.Which of the following are the three phases of Incident response maturity assessment?
Answer: 1)Prepare, Response, and Follow-up Time to Evaluate Your Understanding! 1.Phishing emails include fake notifications from banks and e-payment systems.
Answer: 2)True 2.Which of these is true with respect to passwords?
Answer: 4)Passwords need to be atleast 8 chars of length 3.Which of these are Threats related to Email Security?
Answer: 1)All the options 4.How do we define RADIUS?
Answer: 2)Remote Authentication Dial-In User Service. Final Assessment 1.________ is designed to extract data from its host computer for marketing purposes.
Answer: 4)Spyware 2.The telephone version of phishing that exploits social engineering techniques is known as __________.
Answer: 3)Vishing 3.A type of assessment that is often performed in a sandbox-virtual environment to prevent malware from actually infecting production systems is called ________.
Answer: 3)Dynamic Analysis 4.The three chains of RADIUS Security are ___________________.
Answer: 3)Authentication, Authorization, Accounting 5.An error message displayed on the system, symbolizes virus infection.
Answer: 1)False 6.A kind of a network attack, where an unauthorized person gains access to a network and remains there undetected for a long duration is known as ______________.
Answer: 2)Advanced Persistent Threats 7.As an application of cryptography, digital Signatures and MACs can be used for _____________.
Answer: 4)Authentication 8.The process of converting a message to an unintelligible form with the help of an algorithm and a key is known as _______.
Answer: 1)Encryption 9._________ is a standalone software that does not need human help/host program to spread. Ransomware
Answer: 2)Worm 10.What is PUP?
Answer: 1)Potentially Unwanted Program 11._________ is commonly known for providing backdoor access to the system for malicious users.
Answer: 1)Trojans 12.Which of the following is a physiological biometric that could be used for authentication?
Answer: 3)Facial Recognition 13.Which of the following encryption methods is more suited for key exchange, non-repudiation, and authentication?
Answer: 2)Assymmetric Key Encryption 14.What is the type of malware that restricts access to the computer either by encrypting files on the hard drive or by displaying messages demanding a ransom?
Answer: 1)Ransomware 15.A pharming tactic in which the DNS table in a server is modified to deceive users by redirecting to fraudulent websites.
Answer: 4)DNS Poisoning 16.Threats can exploit assets if assets are not vulnerable.
Answer: 1)False 17.Which of the following security attribute is compromised when data or information is changed or tampered, either accidentally or maliciously?
Answer: 5)Confidentiality and Integrity 18.Which of the following is an effective solution to ensure confidentiality?
Answer: 2)Encryption 19.A process by which potential vulnerabilities and threats can be recognized, enumerated, and prioritized from a hypothetical attacker's pov is called _______________.
Answer: 1)Threat Modeling 20.__________ is a proactive process to predict potential risks efficiently.
Answer: 1)Threat Hunting If you want answers to any of the fresco play courses feel free to ask in the comment section, we will surely help. What is the security attribute that aims to achieve the data privacy and protection against Unauthorised disclosure?What is the security attribute that aims to achieve data privacy and protection against unauthorized disclosure? Confidentiality. What is the security attribute that ensures data and services are available to authorized users whenever required integrity availability confidentiality?Expert-verified answer The security attribute that ensures data and services are available to authorized users whenever required is known as availability. Confidentiality refers to the protection of information from unauthorized access or disclosure. How can you protect confidentiality integrity and availability?Use preventive measures such as redundancy, failover and RAID. Ensure systems and applications stay updated. Use network or server monitoring systems. Ensure a data recovery and business continuity (BC) plan is in place in case of data loss. What is the security attribute that ensures?An abstraction representing the basic properties or characteristics of an entity with respect to safeguarding information; typically associated with internal data structures (e.g., records, buffers, files) within the information system which are used to enable the implementation of access control and flow control ...
Which of the following security attributes is compromised when data or information is changed or tempered?Answer. Explanation: Integrity is the security aspect ensures that the information must not be accidentally or maliciously altered or tampered in transit.
Which of the following terms best describes ensuring that data is accessible to authorized users?Data availability means that information is accessible to authorized users. It provides an assurance that your system and data can be accessed by authenticated users whenever they're needed. Similar to confidentiality and integrity, availability also holds great value.
What is availability in security?As defined in FISMA, the term 'availability' means ensuring timely and reliable access to and use of information.
|