Tổng hợp câu hỏi trắc nghiệm ôn tập Môn An toàn thông tin Test 1 - có đáp án | Trường đại học sư phạm kỹ thuật TP. Hồ Chí Minh
Câu hỏi1: Which of the following is a principle of the CIA Triad that means authorized subjects are granted timely and uninterrupted access to objects? The correct answer is: Availability
Câu hỏi. 2 What is encapsulation? The correct answer is: Adding a header and footer to data as it moves down the OSI stack. Câu hỏi 3 Which one of the following data roles is most likely to assign permissions to grant users access to data? The correct answer is: Administrator. Tài liệu giúp bạn tham khảo, ôn tập và đạt kết quả cao. Mời bạn đọc đón xem!
Môn: An toàn thông tin (INSE330380)
Trường: Đại học Sư phạm Kỹ thuật Thành phố Hồ Chí Minh
Thông tin:
Tác giả:
Preview text:
Câu hỏi1Which of the following is a principle of the CIA Triad that means
authorized subjects are granted timely and uninterrupted access to objects?
The correct answer is: Availability
Câu hỏi2 What is encapsulation?
The correct answer is: Adding a header and footer to data as it moves down the OSI stack
Câu hỏi3 Which one of the following data roles is most likely to assign permissions to grant users access to data?
The correct answer is: Administrator
Câu hỏi4 Which of the following is the weakest element in any security solution? The correct answer is: Humans
Câu hỏi5 What is the first step that individuals responsible for the development of
a business continuity plan should perform?
The correct answer is: Business organization analysis Câu hỏi6
When an employee is to be terminated, which of the following should be done?
The correct answer is: Disable the employee’s network access just as they are informed of the termination Câu hỏi7 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Which of the following is not considered a violation of confidentiality? Câu hỏi 7Select one: a. Social engineering b. Eavesdropping c. Hardware destruction d. Stealing passwords Phản hồi Your answer is correct.
The correct answer is: Hardware destruction Câu hỏi8 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Which networking technology is based on the IEEE 802.3 standard? Câu hỏi 8Select one: a. Token Ring b. Ethernet c. FDDI d. HDLC Phản hồi Your answer is correct.
The correct answer is: Ethernet Câu hỏi9 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Which of the following is the most important aspect of security? Câu hỏi 9Select one: a. Awareness training b. Physical security
Physical security is the most important aspect of overall security. Without physical
security, none of the other aspects of security are sufficient c. Intrusion detection d. Logical security Phản hồi Your answer is correct.
The correct answer is: Physical security Câu hỏi10 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
What security concept encourages administrators to install firewalls, malware scanners, and an IDS on every host? Câu hỏi 10Select one: a. Endpoint security b. VLAN c. Network access control (NAC) d. RADIUS Phản hồi Your answer is correct.
The correct answer is: Endpoint security Câu hỏi11 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
What ensures that the subject of an activity or event cannot deny that the event occurred? Câu hỏi 11Select one: a. CIA Triad b. Nonrepudiation
Nonrepudiation ensures that the subject of an activity or event cannot deny that the event occurred. c. Hash totals d. Abstraction Phản hồi Your answer is correct.
The correct answer is: Nonrepudiation Câu hỏi12 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
If an organization contracts with outside entities to provide key business functions or
services, such as account or technical support, what is the process called that is used to
ensure that these entities support sufficient security? Câu hỏi 12Select one: a. Exit interview b. Asset identification c. Qualitative analysis d. Third-party governance Phản hồi Your answer is correct.
The correct answer is: Third-party governance Câu hỏi13 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
When seeking to hire new employees, what is the first step? Câu hỏi 13Select one: a. Set position classification b. Request resumes c. Create a job description
The first step in hiring new employees is to create a job description. Without a job
description, there is no consensus on what type of individual needs to be found and hired. d. Screen candidates Phản hồi Your answer is correct.
The correct answer is: Create a job description Câu hỏi14 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
What type of plan outlines the procedures to follow when a disaster interrupts the
normal operations of a business? Câu hỏi 14Select one: a. Business impact assessment b. Business continuity plan c. Disaster recovery plan
Disaster recovery plans pick up where business continuity plans leave off. After a
disaster strikes and the business is interrupted, the disaster recovery plan guides
response teams in their efforts to quickly restore business operations to normal levels. d. Vulnerability assessment Phản hồi Your answer is correct.
The correct answer is: Disaster recovery plan Câu hỏi15 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
If a security mechanism offers availability, then it offers a high level of assurance that
authorized subjects can _________________________ the data, objects, and resources. Câu hỏi 15Select one: a. Repudiate b. Access c. Control d. Audit Phản hồi Your answer is correct. The correct answer is: Access Câu hỏi16 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Which of the following contains the primary goals and objectives of security? Câu hỏi 16Select one: a. The Internet b. A network’s border perimeter c. A stand-alone system d. The CIA Triad Phản hồi Your answer is correct.
The correct answer is: The CIA Triad Câu hỏi17 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Vulnerabilities and risks are evaluated based on their threats against which of the following? Câu hỏi 17Select one: a. Data usefulness b. Extent of liability c. Due care d.
One or more of the CIA Triad principles Phản hồi Your answer is correct.
The correct answer is: One or more of the CIA Triad principles Câu hỏi18 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
What security control is directly focused on preventing collusion? Câu hỏi 18Select one: a. Principle of least privilege b. Qualitative risk analysis c. Separation of duties
The likelihood that a co-worker will be willing to collaborate on an illegal or abusive
scheme is reduced because of the higher risk of detection created by the combination
of separation of duties, restricted job responsibilities, and job rotation d. Job descriptions Phản hồi Your answer is correct.
The correct answer is: Separation of duties Câu hỏi19 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Which one of the following identifies the primary a purpose of information classification processes? Câu hỏi 19Select one: a.
Define the requirements for storing data b.
Define the requirements for protecting sensitive data
A primary purpose of information classification processes is to identify security
classifications for sensitive data and define the requirements to protect sensitive data.
Information classification processes will typically include requirements to protect
sensitive data at rest (in backups and stored on media), but not requirements for
backing up and storing any data. Similarly, information classification processes will
typically include requirements to protect sensitive data in transit, but not any data c.
Define the requirements for transmitting data d.
Define the requirements for backing up data Phản hồi Your answer is correct.
The correct answer is: Define the requirements for protecting sensitive data Câu hỏi20 Đúng Đạt điểm 1,00 trên 1,00 Đặt cờ Đoạn văn câu hỏi
Which one of the following would administrators use to connect to a remote server securely for administration? Câu hỏi 20Select one: a. Secure Copy (SCP) b. Telnet c.
Secure File Transfer Protocol (SFTP) d. Secure Shell (SSH)
SSH is a secure alternative to Telnet because it encrypts data transmitted over a
network. In contrast, Telnet transmits data in cleartext. SFTP and SCP are good methods
for transmitting sensitive data over a network, but not for administration purposes. Phản hồi Your answer is correct.
The correct answer is: Secure Shell (SSH)