CYBER SECURITY B
Email address *
73)  What is the activity performed by an organization to ensure that critical business functions will be available to customers, suppliers, regulators, and other entities that must have access to those functions.
1 point
64)  What setup should an administrator use for regularly testing the strength of user passwords?
1 point
93)  One of the goals of Computer Forensics is to:
1 point
98)  What provides detailed documentation of every action performed on a piece of evidence to ensure its integrity?
1 point
53)  Which type of certificate authority (CA) has a self-signed certificate?
1 point
100)  What is the purpose of the Computer Fraud and Abuse Act of 1986?
0 points
58)  This security model addresses data confidentiality in computer systems and is commonly seen in military systems.
1 point
86)  The following is a common threat to the physical security for an organization:
1 point
96)  Computer-Integrity crimes are crimes that account to offenses against the Confidentiality, Integrity or Availability of digital data and computer systems. Examples of these types of crime include:
1 point
88)  Why is asymmetric encryption better than symmetric encryption?
1 point
51)  How does a message encrypted with the Public Key become decrypted with the receiver's appropriate Private Key?
1 point
84)  What is a TPM primarily used for?
1 point
80)  An installation of Windows has become corrupt, what method will allow you to copy files to an external medium?
1 point
Password *
Your answer
74)  Regarding Business Continuity Planning and Disaster Recovery Planning, which one of the following IT platforms typically provide some inherent level of redundancy?
1 point
91)  Sharing a private key, encrypting a message with a private key, sending a message, decrypting a message with a private key is an example of what?
1 point
60)  What is known as a layered approach relying on two or more authentications to establish the identity of a user?
1 point
66)  When does the Challenge Handshake Authentication Protocol (CHAP) perform the handshake process?
1 point
56)  A user is trying to access an FTP server but gets a message saying invalid login credentials, what is the problem?
1 point
70)  What term refers to a stand-by system that is manually added to a network if the primary server fails?
1 point
What is your name? *
Your answer
61)  Your boss does not want anyone else to have the ability to read an email except the intended recipient. What type of security ensures only the intended recipient can read your email?
1 point
75)  The best method for protecting sensitive data is called:
1 point
90)  What is an advantage of Triple-DES over traditional DES?
1 point
81)  Federal agencies report incidents to what organizations?
1 point
92)  Steganography refers to:
0 points
79)  Anti-virus software detects an infection on the hard drive but fails to remove it. After research, you decide that best course of action is to reboot the system into safe mode and proceed with removal. How do you get into safe mode?
1 point
83)  What type of physical attack uses a special key that is cut with all notches to the maximum length and is sharply struck to unlock a door?
1 point
95)  Which one of the following are examples of computer forensic certifications?
1 point
82)  What technology is used for surveillance?
1 point
63)  Which one of these passwords is an example of a complex password?
1 point
69)  A natural disaster is a major adverse event resulting from natural processes of the Earth. Which one of the following is not an effect of a natural disaster on a computer?
1 point
67)  Which one of the following reduces the chances of a single point of failure if a server fails?
1 point
89)  This method is the art and science of hiding messages in pictures or files in such a way that no one, apart from the sender and intended recipient, suspects the existence of a message.
1 point
85)  This physical security measure reduces the likelihood for tailgating into a secure facility.
1 point
68)  An electrical fire that may occur in a computer data center is known as what type of fire?
1 point
76)  This entity is responsible for forming the disaster recovery team.
1 point
94)  This type of data is stored on the local hard drive and is present even if the computer is turned off.
1 point
55)  This type of authentication system requires the user to enter a code from a token along with a PIN.
1 point
72)  In this type of recovery plan test, the response team simulates the recovery without actually initiating recovery procedures.
1 point
62)  This term is used to describe the requirement that different portions of a critical process must be performed by different people.
1 point
54)  What is the purpose of a digital certificate?
1 point
77)  An incremental backup backs up which one of the following?
1 point
57)  Which one the following allows a user to have a one-time password?
1 point
99)  Practitioners use this to fully identify and assess risk factors, balance the expected costs (damages) of incidents with the cost of defenses.
1 point
52)  Which PKI element verifies the authenticity of certificates?
1 point
71)  When mission critical systems are unavailable, organizations are at potential risk. To prevent interrupted information systems operation, which one of the following controls are typically included in an organization's disaster recovery plan?
1 point
59)  Authentication is the process of determining whether someone or something is, in fact, who or what it is supposed to be. What type of authentication methodology uses a person's physical characteristic for identification?
1 point
97)  When performing a computer forensics analysis, examiners must do everything possible to preserve the original media and data. Typically, this involves making a forensic image or forensic copy of the original media, and conducting our analysis on the copy versus the original. This work is an example of what?
1 point
87)  What is the primary role of a cryptologist?
1 point
78)  What type of backup is to a magnetic disk, such as a RAID configuration, Storage Area Network (SAN), or large hard drive?
1 point
65)  What authentication protocol was developed by MIT and utilizes a system of “tickets”?
1 point
Submit
Never submit passwords through Google Forms.
reCAPTCHA
This content is neither created nor endorsed by Google. Report Abuse - Terms of Service