Tổng hợp câu hỏi trắc nghiệm ôn tập Môn An toàn thông tin Test 1 - có đáp án | Trường đại học sư phạm kỹ thuật TP. Hồ Chí Minh

Câu hỏi1: Which of the following is a principle of the CIA Triad that means authorized subjects are granted timely and uninterrupted access to objects? The correct answer is: Availability
Câu hỏi. 2 What is encapsulation? The correct answer is: Adding a header and footer to data as it moves down the OSI stack. Câu hỏi 3 Which one of the following data roles is most likely to assign permissions to grant users access to data? The correct answer is: Administrator. Tài liệu giúp bạn tham khảo, ôn tập và đạt kết quả cao. Mời bạn đọc đón xem!

Câu hỏi1Which of the following is a principle of the CIA Triad that means
authorized subjects are granted timely and uninterrupted access to objects?
The correct answer is: Availability
Câu hỏi2 What is encapsulation?
The correct answer is: Adding a header and footer to data as it moves down the OSI
stack
Câu hỏi3 Which one of the following data roles is most likely to assign permissions
to grant users access to data?
The correct answer is: Administrator
Câu hỏi4 Which of the following is the weakest element in any security solution?
The correct answer is: Humans
Câu hỏi5 What is the first step that individuals responsible for the development of
a business continuity plan should perform?
The correct answer is: Business organization analysis
Câu hỏi 6
When an employee is to be terminated, which of the following should be done?
The correct answer is: Disable the employee’s network access just as they are informed
of the termination
Câu hỏi7
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
Which of the following is not considered a violation of confidentiality?
Câu hỏi 7Select one:
a.
Social engineering
b.
Eavesdropping
c.
Hardware destruction
d.
Stealing passwords
Phản hồi
Your answer is correct.
The correct answer is: Hardware destruction
Câu hỏi8
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
Which networking technology is based on the IEEE 802.3 standard?
Câu hỏi 8Select one:
a.
Token Ring
b.
Ethernet
c.
FDDI
d.
HDLC
Phản hồi
Your answer is correct.
The correct answer is: Ethernet
Câu hỏi9
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
Which of the following is the most important aspect of security?
Câu hỏi 9Select one:
a.
Awareness training
b.
Physical security
Physical security is the most important aspect of overall security. Without physical
security, none of the other aspects of security are sufficient
c.
Intrusion detection
d.
Logical security
Phản hồi
Your answer is correct.
The correct answer is: Physical security
Câu hỏi10
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
What security concept encourages administrators to install firewalls, malware scanners,
and an IDS on every host?
Câu hỏi 10Select one:
a.
Endpoint security
b.
VLAN
c.
Network access control (NAC)
d.
RADIUS
Phản hồi
Your answer is correct.
The correct answer is: Endpoint security
Câu hỏi11
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
What ensures that the subject of an activity or event cannot deny that the event
occurred?
Câu hỏi 11Select one:
a.
CIA Triad
b.
Nonrepudiation
Nonrepudiation ensures that the subject of an activity or event cannot deny that the
event occurred.
c.
Hash totals
d.
Abstraction
Phản hồi
Your answer is correct.
The correct answer is: Nonrepudiation
Câu hỏi12
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
If an organization contracts with outside entities to provide key business functions or
services, such as account or technical support, what is the process called that is used to
ensure that these entities support sufficient security?
Câu hỏi 12Select one:
a.
Exit interview
b.
Asset identification
c.
Qualitative analysis
d.
Third-party governance
Phản hồi
Your answer is correct.
The correct answer is: Third-party governance
Câu hỏi13
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
When seeking to hire new employees, what is the first step?
Câu hỏi 13Select one:
a.
Set position classification
b.
Request resumes
c.
Create a job description
The first step in hiring new employees is to create a job description. Without a job
description, there is no consensus on what type of individual needs to be found and
hired.
d.
Screen candidates
Phản hồi
Your answer is correct.
The correct answer is: Create a job description
Câu hỏi14
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
What type of plan outlines the procedures to follow when a disaster interrupts the
normal operations of a business?
Câu hỏi 14Select one:
a.
Business impact assessment
b.
Business continuity plan
c.
Disaster recovery plan
Disaster recovery plans pick up where business continuity plans leave off. After a
disaster strikes and the business is interrupted, the disaster recovery plan guides
response teams in their efforts to quickly restore business operations to normal levels.
d.
Vulnerability assessment
Phản hồi
Your answer is correct.
The correct answer is: Disaster recovery plan
Câu hỏi15
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
If a security mechanism offers availability, then it offers a high level of assurance that
authorized subjects can _________________________ the data, objects, and resources.
Câu hỏi 15Select one:
a.
Repudiate
b.
Access
c.
Control
d.
Audit
Phản hồi
Your answer is correct.
The correct answer is: Access
Câu hỏi16
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
Which of the following contains the primary goals and objectives of security?
Câu hỏi 16Select one:
a.
The Internet
b.
A network’s border perimeter
c.
A stand-alone system
d.
The CIA Triad
Phản hồi
Your answer is correct.
The correct answer is: The CIA Triad
Câu hỏi17
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
Vulnerabilities and risks are evaluated based on their threats against which of the
following?
Câu hỏi 17Select one:
a.
Data usefulness
b.
Extent of liability
c.
Due care
d.
One or more of the CIA Triad principles
Phản hồi
Your answer is correct.
The correct answer is: One or more of the CIA Triad principles
Câu hỏi18
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
What security control is directly focused on preventing collusion?
Câu hỏi 18Select one:
a.
Principle of least privilege
b.
Qualitative risk analysis
c.
Separation of duties
The likelihood that a co-worker will be willing to collaborate on an illegal or abusive
scheme is reduced because of the higher risk of detection created by the combination
of separation of duties, restricted job responsibilities, and job rotation
d.
Job descriptions
Phản hồi
Your answer is correct.
The correct answer is: Separation of duties
Câu hỏi19
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
Which one of the following identifies the primary a purpose of information classification
processes?
Câu hỏi 19Select one:
a.
Define the requirements for storing data
b.
Define the requirements for protecting sensitive data
A primary purpose of information classification processes is to identify security
classifications for sensitive data and define the requirements to protect sensitive data.
Information classification processes will typically include requirements to protect
sensitive data at rest (in backups and stored on media), but not requirements for
backing up and storing any data. Similarly, information classification processes will
typically include requirements to protect sensitive data in transit, but not any data
c.
Define the requirements for transmitting data
d.
Define the requirements for backing up data
Phản hồi
Your answer is correct.
The correct answer is: Define the requirements for protecting sensitive data
Câu hỏi20
Đúng
Đạt điểm 1,00 trên 1,00
Đặt cờ
Đoạn văn câu hỏi
Which one of the following would administrators use to connect to a remote server
securely for administration?
Câu hỏi 20Select one:
a.
Secure Copy (SCP)
b.
Telnet
c.
Secure File Transfer Protocol (SFTP)
d.
Secure Shell (SSH)
SSH is a secure alternative to Telnet because it encrypts data transmitted over a
network. In contrast, Telnet transmits data in cleartext. SFTP and SCP are good methods
for transmitting sensitive data over a network, but not for administration purposes.
Phản hồi
Your answer is correct.
The correct answer is: Secure Shell (SSH)
| 1/10

Preview text:

Câu hỏi1Which of the following is a principle of the CIA Triad that means
authorized subjects are granted timely and uninterrupted access to objects?
The correct answer is: Availability
Câu hỏi2 What is encapsulation?
The correct answer is: Adding a header and footer to data as it moves down the OSI stack
Câu hỏi3 Which one of the following data roles is most likely to assign permissions to grant users access to data?
The correct answer is: Administrator
Câu hỏi4 Which of the following is the weakest element in any security solution? The correct answer is: Humans
Câu hỏi5 What is the first step that individuals responsible for the development of
a business continuity plan should perform?
The correct answer is: Business organization analysis Câu hỏi6
When an employee is to be terminated, which of the following should be done?
The correct answer is: Disable the employee’s network access just as they are informed of the termination Câu hỏi7 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Which of the following is not considered a violation of confidentiality? Câu hỏi 7Select one: a. Social engineering b. Eavesdropping c. Hardware destruction d. Stealing passwords Phản hồi Your answer is correct.
The correct answer is: Hardware destruction Câu hỏi8 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Which networking technology is based on the IEEE 802.3 standard? Câu hỏi 8Select one: a. Token Ring b. Ethernet c. FDDI d. HDLC Phản hồi Your answer is correct.
The correct answer is: Ethernet Câu hỏi9 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Which of the following is the most important aspect of security? Câu hỏi 9Select one: a. Awareness training b. Physical security
Physical security is the most important aspect of overall security. Without physical
security, none of the other aspects of security are sufficient c. Intrusion detection d. Logical security Phản hồi Your answer is correct.
The correct answer is: Physical security Câu hỏi10 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
What security concept encourages administrators to install firewalls, malware scanners, and an IDS on every host? Câu hỏi 10Select one: a. Endpoint security b. VLAN c. Network access control (NAC) d. RADIUS Phản hồi Your answer is correct.
The correct answer is: Endpoint security Câu hỏi11 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
What ensures that the subject of an activity or event cannot deny that the event occurred? Câu hỏi 11Select one: a. CIA Triad b. Nonrepudiation
Nonrepudiation ensures that the subject of an activity or event cannot deny that the event occurred. c. Hash totals d. Abstraction Phản hồi Your answer is correct.
The correct answer is: Nonrepudiation Câu hỏi12 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
If an organization contracts with outside entities to provide key business functions or
services, such as account or technical support, what is the process called that is used to
ensure that these entities support sufficient security? Câu hỏi 12Select one: a. Exit interview b. Asset identification c. Qualitative analysis d. Third-party governance Phản hồi Your answer is correct.
The correct answer is: Third-party governance Câu hỏi13 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
When seeking to hire new employees, what is the first step? Câu hỏi 13Select one: a. Set position classification b. Request resumes c. Create a job description
The first step in hiring new employees is to create a job description. Without a job
description, there is no consensus on what type of individual needs to be found and hired. d. Screen candidates Phản hồi Your answer is correct.
The correct answer is: Create a job description Câu hỏi14 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
What type of plan outlines the procedures to follow when a disaster interrupts the
normal operations of a business? Câu hỏi 14Select one: a. Business impact assessment b. Business continuity plan c. Disaster recovery plan
Disaster recovery plans pick up where business continuity plans leave off. After a
disaster strikes and the business is interrupted, the disaster recovery plan guides
response teams in their efforts to quickly restore business operations to normal levels. d. Vulnerability assessment Phản hồi Your answer is correct.
The correct answer is: Disaster recovery plan Câu hỏi15 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
If a security mechanism offers availability, then it offers a high level of assurance that
authorized subjects can _________________________ the data, objects, and resources. Câu hỏi 15Select one: a. Repudiate b. Access c. Control d. Audit Phản hồi Your answer is correct. The correct answer is: Access Câu hỏi16 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Which of the following contains the primary goals and objectives of security? Câu hỏi 16Select one: a. The Internet b. A network’s border perimeter c. A stand-alone system d. The CIA Triad Phản hồi Your answer is correct.
The correct answer is: The CIA Triad Câu hỏi17 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Vulnerabilities and risks are evaluated based on their threats against which of the following? Câu hỏi 17Select one: a. Data usefulness b. Extent of liability c. Due care d.
One or more of the CIA Triad principles Phản hồi Your answer is correct.
The correct answer is: One or more of the CIA Triad principles Câu hỏi18 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
What security control is directly focused on preventing collusion? Câu hỏi 18Select one: a. Principle of least privilege b. Qualitative risk analysis c. Separation of duties
The likelihood that a co-worker will be willing to collaborate on an illegal or abusive
scheme is reduced because of the higher risk of detection created by the combination
of separation of duties, restricted job responsibilities, and job rotation d. Job descriptions Phản hồi Your answer is correct.
The correct answer is: Separation of duties Câu hỏi19 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Which one of the following identifies the primary a purpose of information classification processes? Câu hỏi 19Select one: a.
Define the requirements for storing data b.
Define the requirements for protecting sensitive data
A primary purpose of information classification processes is to identify security
classifications for sensitive data and define the requirements to protect sensitive data.
Information classification processes will typically include requirements to protect
sensitive data at rest (in backups and stored on media), but not requirements for
backing up and storing any data. Similarly, information classification processes will
typically include requirements to protect sensitive data in transit, but not any data c.
Define the requirements for transmitting data d.
Define the requirements for backing up data Phản hồi Your answer is correct.
The correct answer is: Define the requirements for protecting sensitive data Câu hỏi20 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Which one of the following would administrators use to connect to a remote server securely for administration? Câu hỏi 20Select one: a. Secure Copy (SCP) b. Telnet c.
Secure File Transfer Protocol (SFTP) d. Secure Shell (SSH)
SSH is a secure alternative to Telnet because it encrypts data transmitted over a
network. In contrast, Telnet transmits data in cleartext. SFTP and SCP are good methods
for transmitting sensitive data over a network, but not for administration purposes. Phản hồi Your answer is correct.
The correct answer is: Secure Shell (SSH)