Cybersecurity Roles, Processes & Operating System Security All Quiz Answers | Principles of the CIA Triad Authentication and Access control | Week 2

Cybersecurity Roles, Processes & Operating System Security All Quiz Answers | Principles of the CIA Triad Authentication | Access control


Further discussion of confidentiality, integrity and availability


Q1) In the Alice, Bob and Trudy examples, who is always portrayed as the intruder ?

  • Trudy

Q2) Which aspect of the CIA Triad would cover preserving authorized restrictions on information access and disclosure ?

  • Confidentiality

Q3) A message that Bob receives from Alice is genuine and can be verified as such demonstrates which key property ?

  • Authenticity





Principles of the CIA Triad


Q1) The unauthorized disclosure of information would violate which aspect of the CIA Triad ?

  • Confidentiality

Q2) Which aspect of the CIA Triad would cover ensuring information non-repudiation and authenticity ?

  • Integrity

Q3) If Trudy intercepts and reads a message that Alice is sending to Bob, and then she deletes it without allowing it to be delivered, which 2 aspects of the CIA Triad have been violated ?

  • Availability & Confidentiality





What is AAA ?


Q1) Which is the correct order for gaining access to a resource ?

  • Identification, Authentication, Authorization, Accountability


Q2) Which type of method would include Something you know, such as a password ?

  • Authentication





Access Control


Q1) Which three (3) are common methods of access control ?

  • Role Based Access Control (RBAC)
  • Discretionary Access Control (DAC)
  • Mandatory Access Control (MAC)


Q2) Which three (3) items would be considered Physical Access Control methods ?

  • Perimetral
  • Building
  • Work areas




Authentication and Access control


Q1) Identify the three (3) security functions associated with AAA.

  • Authorization
  • Accountability (Accounting)
  • Authentication


Q2) Which statement best describes DAC (Discretionary Access Control) ?

  • Each object (folder or file) has an owner and the owner defines the rights and privilege.


Q3) Which is an example of technical uses of physcial security controls ?

  • All of the above.


Q4) Name one of the three control types.

  • Technical


Q5) Which of the following is NOT an authentication method ?

  • Something you get


Q6) Hamid has access to certain resources because he is a Quality Control Inspector and he has access to other resources because he is the manager of that team. Which form of access control is his company most likely using ?

  • Role Based Access Control (RBAC)


Q7) Which two (2) of these are useful tools used to monitor network access control processes ?

  • Sniffers
  • HoneyPots






***************************************************************************************************************************

Cybersecurity Roles, Processes & Operating System Security 



Post a Comment

0 Comments