Chapter 1 - Computer Security Concepts | Bài test nhóm 11 môn An toàn thông tin Trường đại học sư phạm kỹ thuật TP. Hồ Chí Minh

Which one of the following would administrators use to connect to a remote server securely for administration? a. Secure File Transfer Protocol (SFTP); b. Telnet; c. Secure Copy (SCP); d. Secure Shell (SSH). Your answer is correct. The correct answer is: Secure Shell (SSH). SSH is a secure alternative to Telnet because it encrypts data transmitted over a network. In contrast, Telnet transmits data in cleartext. SFTP and SCP are good methods for transmitting sensitive data over a network, but not for administration purposes. Tài liệu giúp bạn tham khảo, ôn tập và đạt kết quả cao. Mời bạn đọc đón xem!

09:34 26/09/2023
Test_C1: Xem lại lần làm thử
https://utex.hcmute.edu.vn/mod/quiz/review.php?attempt=3867607&cmid=892885
1/9
Nhà c a tôi Chapter 1 - Computer Security Concepts / Các khoá h c c a tôi / INSE330380_23_1_11 / / Test_C1
An toan thong tin_ Nhom 11
Bt u vào lúcđ Tuesday, 26 September 2023, 9:16 AM
Trng thái Đã xong
Kết thúc lúc Tuesday, 26 September 2023, 9:34 AM
Thi gian th c
hi n
18 phút 3 giây
Đim 20,00/20,00
Đim 10,00 100 trên 10,00 ( %)
Câu h i 1
Đúng
Đ đt im 1,00 trên 1,00
Which one of the following would administrators use to connect to a remote server securely for administration?
Select one:
a. Secure File Transfer Protocol (SFTP)
b. Telnet
c. Secure Copy (SCP)
d. Secure Shell (SSH) SSH is a secure alternative to Telnet because it encrypts data transmitted over a
network. In contrast, Telnet transmits data in cleartext. SFTP and SCP are good
methods for transmitting sensitive data over a network, but not for administration
purposes.
Your answer is correct.
The correct answer is: Secure Shell (SSH)
09:34 26/09/2023
Test_C1: Xem lại lần làm thử
https://utex.hcmute.edu.vn/mod/quiz/review.php?attempt=3867607&cmid=892885
2/9
Câu h i 2
Đúng
Đ đt im 1,00 trên 1,00
Câu h i 3
Đúng
Đ đt im 1,00 trên 1,00
Which one of the following data roles is most likely to assign permissions to grant users access to data?
Select one:
a. Owner
b. Custodian
c. User
d. Administrator
The administrator assigns permissions based on the principles of least privilege and need to
know. A custodian protects the integrity and security of the data. Owners have ultimate
responsibility for the data and ensure that it is classied properly, and owners provide
guidance to administrators on who can have access, but owners do not assign permissions.
Users simply access the data
Your answer is correct.
The correct answer is: Administrator
Which of the following is not considered a violation of condentiality?
Select one:
a. Stealing passwords
b. Social engineering
c. Eavesdropping
d. Hardware destruction
Your answer is correct.
The correct answer is: Hardware destruction
09:34 26/09/2023
Test_C1: Xem lại lần làm thử
https://utex.hcmute.edu.vn/mod/quiz/review.php?attempt=3867607&cmid=892885
3/9
Câu h i 4
Đúng
Đ đt im 1,00 trên 1,00
Câu h i 5
Đúng
Đ đt im 1,00 trên 1,00
Which of the following is the most important aspect of security?
Select one:
a. Awareness training
b. Physical security Physical security is the most important aspect of overall
security. Without physical security, none of the other aspects of
security are sucient
c. Intrusion detection
d. Logical security
Your answer is correct.
The correct answer is: Physical security
What is the rst step that individuals responsible for the development of a business continuity plan should perform?
Select one:
a. Resource requirements analysis
b. BCP team selection
c. Legal and regulatory assessment
d. Business organization analysis The business organization analysis helps the initial planners
select appropriate BCP team members and then guides the
overall BCP process
Your answer is correct.
The correct answer is: Business organization analysis
09:34 26/09/2023
Test_C1: Xem lại lần làm thử
https://utex.hcmute.edu.vn/mod/quiz/review.php?attempt=3867607&cmid=892885
4/9
Câu h i 6
Đúng
Đ đt im 1,00 trên 1,00
Câu h i 7
Đúng
Đ đt im 1,00 trên 1,00
Which one of the following identies the primary a purpose of information classication processes?
Select one:
a. Dene the requirements for storing data
b. Dene the requirements
for protecting sensitive
data
A primary purpose of information classication processes is to identify security classications for
sensitive data and dene the requirements to protect sensitive data. Information classication
processes will typically include requirements to protect sensitive data at rest (in backups and stored
on media), but not requirements for backing up and storing any data. Similarly, information
classication processes will typically include requirements to protect sensitive data in transit, but
not any data
c. Dene the requirements for backing up data
d. Dene the requirements for transmitting data
Your answer is correct.
The correct answer is: Dene the requirements for protecting sensitive data
When an employee is to be terminated, which of the following should be done?
Select one:
a. Disable the employee’s network access just as they are
informed of the termination
You should remove or disable the employees network user
account immediately before or at the same time they are
informed of their termination.
b. Send out a broadcast email informing everyone that a specic employee is to be terminated.
c. Inform the employee a few hours before they are ocially terminated.
d. Wait until you and the employee are the only people remaining in the building before announcing the termination
Your answer is correct.
The correct answer is: Disable the employees network access just as they are informed of the termination
09:34 26/09/2023
Test_C1: Xem lại lần làm thử
https://utex.hcmute.edu.vn/mod/quiz/review.php?attempt=3867607&cmid=892885
5/9
Câu h i 8
Đúng
Đ đt im 1,00 trên 1,00
Câu h i 9
Đúng
Đ đt im 1,00 trên 1,00
Câu h i 10
Đúng
Đ đt im 1,00 trên 1,00
Which of the following is the weakest element in any security solution?
Select one:
a. Internet connections
b. Software products
c. Security policies
d. Humans
Your answer is correct.
The correct answer is: Humans
When seeking to hire new employees, what is the rst step?
Select one:
a. Set position classication
b. Create a job description The rst step in hiring new employees is to create a job description.
Without a job description, there is no consensus on what type of
individual needs to be found and hired.
c. Request resumes
d. Screen candidates
Your answer is correct.
The correct answer is: Create a job description
What ensures that the subject of an activity or event cannot deny that the event occurred?
Select one:
a. Hash totals
b. CIA Triad
c. Nonrepudiation
Nonrepudiation ensures that the subject of an
activity or event cannot deny that the event occurred.
d. Abstraction
Your answer is correct.
The correct answer is: Nonrepudiation
09:34 26/09/2023
Test_C1: Xem lại lần làm thử
https://utex.hcmute.edu.vn/mod/quiz/review.php?attempt=3867607&cmid=892885
6/9
Câu h i 11
Đúng
Đ đt im 1,00 trên 1,00
Câu h i 12
Đúng
Đ đt im 1,00 trên 1,00
Câu h i 13
Đúng
Đ đt im 1,00 trên 1,00
If an organization contracts with outside entities to provide key business functions or services, such as account or technical support, what is
the process called that is used to ensure that these entities support sucient security?
Select one:
a. Third-party governance
b. Exit interview
c. Qualitative analysis
d. Asset identication
Your answer is correct.
The correct answer is: Third-party governance
If a security mechanism offers availability, then it offers a high level of assurance that authorized subjects can _________________________ the
data, objects, and resources.
Select one:
a. Access
b. Control
c. Audit
d. Repudiate
Your answer is correct.
The correct answer is: Access
What security concept encourages administrators to install rewalls, malware scanners, and an IDS on every host?
Select one:
a. Endpoint security
b. Network access control (NAC)
c. VLAN
d. RADIUS
Your answer is correct.
The correct answer is: Endpoint security
09:34 26/09/2023
Test_C1: Xem lại lần làm thử
https://utex.hcmute.edu.vn/mod/quiz/review.php?attempt=3867607&cmid=892885
7/9
Câu h i 14
Đúng
Đ đt im 1,00 trên 1,00
Câu h i 15
Đúng
Đ đt im 1,00 trên 1,00
Câu h i 16
Đúng
Đ đt im 1,00 trên 1,00
Vulnerabilities and risks are evaluated based on their threats against which of the following?
Select one:
a. Extent of liability
b. Due care
c. One or more of the CIA Triad principles
d. Data usefulness
Your answer is correct.
The correct answer is: One or more of the CIA Triad principles
What type of plan outlines the procedures to follow when a disaster interrupts the normal operations of a business?
Select one:
a. Vulnerability assessment
b. Disaster recovery plan Disaster recovery plans pick up where business continuity plans leave off. After a
disaster strikes and the business is interrupted, the disaster recovery plan guides
response teams in their efforts to quickly restore business operations to normal
levels.
c. Business impact assessment
d. Business continuity plan
Your answer is correct.
The correct answer is: Disaster recovery plan
What is encapsulation?
Select one:
a. Verifying a person’s identity
b. Adding a header and footer to data as it moves down the OSI stack
c. Protecting evidence until it has been properly collected
d. Changing the source and destination addresses of a packet
Your answer is correct.
The correct answer is: Adding a header and footer to data as it moves down the OSI stack
09:34 26/09/2023
Test_C1: Xem lại lần làm thử
https://utex.hcmute.edu.vn/mod/quiz/review.php?attempt=3867607&cmid=892885
8/9
Câu h i 17
Đúng
Đ đt im 1,00 trên 1,00
Câu h i 18
Đúng
Đ đt im 1,00 trên 1,00
Câu h i 19
Đúng
Đ đt im 1,00 trên 1,00
Which of the following contains the primary goals and objectives of security?
Select one:
a. The CIA Triad
b. A stand-alone system
c. The Internet
d. A network’s border perimeter
Your answer is correct.
The correct answer is: The CIA Triad
Which of the following is a principle of the CIA Triad that means authorized subjects are granted timely and uninterrupted access to objects?
Select one:
a. Identication
b. Layering
c. Availability
d. Encryption
Your answer is correct.
The correct answer is: Availability
What security control is directly focused on preventing collusion?
Select one:
a. Job descriptions
b. Separation of duties The likelihood that a co-worker will be willing to collaborate on an illegal or
abusive scheme is reduced because of the higher risk of detection created by the
combination of separation of duties, restricted job responsibilities, and job
rotation
c. Principle of least privilege
d. Qualitative risk analysis
Your answer is correct.
The correct answer is: Separation of duties
09:34 26/09/2023
Test_C1: Xem lại lần làm thử
https://utex.hcmute.edu.vn/mod/quiz/review.php?attempt=3867607&cmid=892885
9/9
Câu h i 20
Đúng
Đ đt im 1,00 trên 1,00
Which networking technology is based on the IEEE 802.3 standard?
Select one:
a. Ethernet
b. Token Ring
c. HDLC
d. FDDI
Your answer is correct.
The correct answer is: Ethernet
Chapter 1 - Computer Security Concepts
Chuyn t i...
Video: Review Chapter 1 and Excercise
| 1/9

Preview text:

09:34 26/09/2023
Test_C1: Xem lại lần làm thử
An toan thong tin_ Nhom 11
 Nhà của tôi / Các khoá học của tôi / INSE330380_23_1_11 / Chapter 1 - Computer Security Concepts / Test_C1 Bắt đầu vào lúc
Tuesday, 26 September 2023, 9:16 AM Trạng thái Đã xong Kết thúc lúc
Tuesday, 26 September 2023, 9:34 AM
Thời gian thực 18 phút 3 giây hiện Điểm 20,00/20,00 Điểm
10,00 trên 10,00 (100%) Câu hỏi 1 Đúng Đạ đ t iểm 1,00 trên 1,00
Which one of the following would administrators use to connect to a remote server securely for administration? Select one:
a. Secure File Transfer Protocol (SFTP) b. Telnet c. Secure Copy (SCP) d. Secure Shell (SSH) 
SSH is a secure alternative to Telnet because it encrypts data transmitted over a
network. In contrast, Telnet transmits data in cleartext. SFTP and SCP are good
methods for transmitting sensitive data over a network, but not for administration purposes. Your answer is correct.
The correct answer is: Secure Shell (SSH) 
https://utex.hcmute.edu.vn/mod/quiz/review.php?attempt=3867607&cmid=892885 1/9 09:34 26/09/2023
Test_C1: Xem lại lần làm thử Câu hỏi 2 Đúng Đạ đ t iểm 1,00 trên 1,00
Which one of the following data roles is most likely to assign permissions to grant users access to data? Select one: a. Owner b. Custodian c. User d. Administrator 
The administrator assigns permissions based on the principles of least privilege and need to
know. A custodian protects the integrity and security of the data. Owners have ultimate
responsibility for the data and ensure that it is classied properly, and owners provide
guidance to administrators on who can have access, but owners do not assign permissions. Users simply access the data Your answer is correct.
The correct answer is: Administrator Câu hỏi 3 Đúng Đạ đ t iểm 1,00 trên 1,00
Which of the following is not considered a violation of condentiality? Select one: a. Stealing passwords b. Social engineering c. Eavesdropping d. Hardware destruction  Your answer is correct.
The correct answer is: Hardware destruction 
https://utex.hcmute.edu.vn/mod/quiz/review.php?attempt=3867607&cmid=892885 2/9 09:34 26/09/2023
Test_C1: Xem lại lần làm thử Câu hỏi 4 Đúng Đạ đ t iểm 1,00 trên 1,00
Which of the following is the most important aspect of security? Select one: a. Awareness training b. Physical security 
Physical security is the most important aspect of overall
security. Without physical security, none of the other aspects of security are sucient c. Intrusion detection d. Logical security Your answer is correct.
The correct answer is: Physical security Câu hỏi 5 Đúng Đạ đ t iểm 1,00 trên 1,00
What is the rst step that individuals responsible for the development of a business continuity plan should perform? Select one:
a. Resource requirements analysis b. BCP team selection
c. Legal and regulatory assessment
d. Business organization analysis 
The business organization analysis helps the initial planners
select appropriate BCP team members and then guides the overall BCP process Your answer is correct.
The correct answer is: Business organization analysis 
https://utex.hcmute.edu.vn/mod/quiz/review.php?attempt=3867607&cmid=892885 3/9 09:34 26/09/2023
Test_C1: Xem lại lần làm thử Câu hỏi 6 Đúng Đạ đ t iểm 1,00 trên 1,00
Which one of the following identies the primary a purpose of information classication processes? Select one:
a. Dene the requirements for storing data
b. Dene the requirements 
A primary purpose of information classication processes is to identify security classications for for protecting sensitive
sensitive data and dene the requirements to protect sensitive data. Information classication data
processes will typically include requirements to protect sensitive data at rest (in backups and stored
on media), but not requirements for backing up and storing any data. Similarly, information
classication processes will typically include requirements to protect sensitive data in transit, but not any data
c. Dene the requirements for backing up data
d. Dene the requirements for transmitting data Your answer is correct.
The correct answer is: Dene the requirements for protecting sensitive data Câu hỏi 7 Đúng Đạ đ t iểm 1,00 trên 1,00
When an employee is to be terminated, which of the following should be done? Select one:
a. Disable the employee’s network access just as they are 
You should remove or disable the employee’s network user informed of the termination
account immediately before or at the same time they are informed of their termination.
b. Send out a broadcast email informing everyone that a specic employee is to be terminated.
c. Inform the employee a few hours before they are ocially terminated.
d. Wait until you and the employee are the only people remaining in the building before announcing the termination Your answer is correct.
The correct answer is: Disable the employee’s network access just as they are informed of the termination 
https://utex.hcmute.edu.vn/mod/quiz/review.php?attempt=3867607&cmid=892885 4/9 09:34 26/09/2023
Test_C1: Xem lại lần làm thử Câu hỏi 8 Đúng Đạ đ t iểm 1,00 trên 1,00
Which of the following is the weakest element in any security solution? Select one: a. Internet connections b. Software products c. Security policies d. Humans  Your answer is correct. The correct answer is: Humans Câu hỏi 9 Đúng Đạ đ t iểm 1,00 trên 1,00
When seeking to hire new employees, what is the rst step? Select one:
a. Set position classication b. Create a job description 
The rst step in hiring new employees is to create a job description.
Without a job description, there is no consensus on what type of
individual needs to be found and hired. c. Request resumes d. Screen candidates Your answer is correct.
The correct answer is: Create a job description Câu hỏi 10 Đúng Đạ đ t iểm 1,00 trên 1,00
What ensures that the subject of an activity or event cannot deny that the event occurred? Select one: a. Hash totals b. CIA Triad c. Nonrepudiation 
Nonrepudiation ensures that the subject of an
activity or event cannot deny that the event occurred. d. Abstraction Your answer is correct.
The correct answer is: Nonrepudiation 
https://utex.hcmute.edu.vn/mod/quiz/review.php?attempt=3867607&cmid=892885 5/9 09:34 26/09/2023
Test_C1: Xem lại lần làm thử Câu hỏi 11 Đúng Đạ đ t iểm 1,00 trên 1,00
If an organization contracts with outside entities to provide key business functions or services, such as account or technical support, what is
the process called that is used to ensure that these entities support sucient security? Select one: a. Third-party governance  b. Exit interview c. Qualitative analysis d. Asset identication Your answer is correct.
The correct answer is: Third-party governance Câu hỏi 12 Đúng Đạ đ t iểm 1,00 trên 1,00
If a security mechanism offers availability, then it offers a high level of assurance that authorized subjects can _________________________ the data, objects, and resources. Select one: a. Access  b. Control c. Audit d. Repudiate Your answer is correct. The correct answer is: Access Câu hỏi 13 Đúng Đạ đ t iểm 1,00 trên 1,00
What security concept encourages administrators to install rewalls, malware scanners, and an IDS on every host? Select one: a. Endpoint security 
b. Network access control (NAC) c. VLAN d. RADIUS Your answer is correct.
The correct answer is: Endpoint security 
https://utex.hcmute.edu.vn/mod/quiz/review.php?attempt=3867607&cmid=892885 6/9 09:34 26/09/2023
Test_C1: Xem lại lần làm thử Câu hỏi 14 Đúng Đạ đ t iểm 1,00 trên 1,00
Vulnerabilities and risks are evaluated based on their threats against which of the following? Select one: a. Extent of liability b. Due care
c. One or more of the CIA Triad principles  d. Data usefulness Your answer is correct.
The correct answer is: One or more of the CIA Triad principles Câu hỏi 15 Đúng Đạ đ t iểm 1,00 trên 1,00
What type of plan outlines the procedures to follow when a disaster interrupts the normal operations of a business? Select one: a. Vulnerability assessment b. Disaster recovery plan 
Disaster recovery plans pick up where business continuity plans leave off. After a
disaster strikes and the business is interrupted, the disaster recovery plan guides
response teams in their efforts to quickly restore business operations to normal levels. c. Business impact assessment d. Business continuity plan Your answer is correct.
The correct answer is: Disaster recovery plan Câu hỏi 16 Đúng Đạ đ t iểm 1,00 trên 1,00 What is encapsulation? Select one:
a. Verifying a person’s identity
b. Adding a header and footer to data as it moves down the OSI stack 
c. Protecting evidence until it has been properly collected
d. Changing the source and destination addresses of a packet Your answer is correct.
The correct answer is: Adding a header and footer to data as it moves down the OSI stack 
https://utex.hcmute.edu.vn/mod/quiz/review.php?attempt=3867607&cmid=892885 7/9 09:34 26/09/2023
Test_C1: Xem lại lần làm thử Câu hỏi 17 Đúng Đạ đ t iểm 1,00 trên 1,00
Which of the following contains the primary goals and objectives of security? Select one: a. The CIA Triad  b. A stand-alone system c. The Internet
d. A network’s border perimeter Your answer is correct.
The correct answer is: The CIA Triad Câu hỏi 18 Đúng Đạ đ t iểm 1,00 trên 1,00
Which of the following is a principle of the CIA Triad that means authorized subjects are granted timely and uninterrupted access to objects? Select one: a. Identication b. Layering c. Availability  d. Encryption Your answer is correct.
The correct answer is: Availability Câu hỏi 19 Đúng Đạ đ t iểm 1,00 trên 1,00
What security control is directly focused on preventing collusion? Select one: a. Job descriptions b. Separation of duties 
The likelihood that a co-worker will be willing to collaborate on an illegal or
abusive scheme is reduced because of the higher risk of detection created by the
combination of separation of duties, restricted job responsibilities, and job rotation
c. Principle of least privilege d. Qualitative risk analysis Your answer is correct.
The correct answer is: Separation of duties 
https://utex.hcmute.edu.vn/mod/quiz/review.php?attempt=3867607&cmid=892885 8/9 09:34 26/09/2023
Test_C1: Xem lại lần làm thử Câu hỏi 20 Đúng Đạ đ t iểm 1,00 trên 1,00
Which networking technology is based on the IEEE 802.3 standard? Select one: a. Ethernet  b. Token Ring c. HDLC d. FDDI Your answer is correct.
The correct answer is: Ethernet
◄ Chapter 1 - Computer Security Concepts Chuyển tới...
Video: Review Chapter 1 and Excercise ►
https://utex.hcmute.edu.vn/mod/quiz/review.php?attempt=3867607&cmid=892885 9/9