Information Assuarance Fundamentals

Contents

Results

-

#1. What term refers to the protection of information systems against unauthorized access, disclosure, disruption, modification, or destruction?

#2. Which of the following is a common method for ensuring the confidentiality of sensitive information during transmission over the internet?

#3. The process of converting plaintext into ciphertext to secure data is known as:

#4. What is the primary purpose of a firewall in the context of internet security?

#5. Two-factor authentication typically involves the combination of:

#6. Which of the following combinations is typically used in Two-Factor Authentication (2FA)?

#7. Which type of malware disguises itself as legitimate software but carries out malicious activities without the user's knowledge?

#8. In the context of internet security, what does the term "phishing" refer to?

#9. The process of verifying the identity of a user, system, or application is called:

#10. Which cryptographic algorithm is commonly used for secure communication over the internet, providing confidentiality and integrity?

#11. 10. What is the purpose of a Virtual Private Network (VPN) in the context of internet security?

#12. 11. The term "zero-day vulnerability" refers to:

#13. 12. What is the primary goal of access control in information security?

#14. 13. Which security measure involves encoding information to make it unreadable without the appropriate decryption key?

#15. 14. A security token, such as a smart card or hardware token, is an example of:

#16. 15. What is the purpose of an Intrusion Detection System (IDS) in the context of internet security?

#17. 16. The process of ensuring that data is not altered or tampered with during transmission or storage is known as:

#18. 17. Which of the following is a best practice for password security?

#19. 18. What is the primary purpose of a Secure Sockets Layer (SSL) certificate on a website?

#20. 19. The term "denial of service" (DoS) refers to:

#21. 20. The concept of "least privilege" in access control involves:

#22. 21. Which type of malware is designed to spread rapidly across a network, often exploiting software vulnerabilities?

#23. 22. A biometric authentication method that analyzes the physical characteristics of an individual's face is called:

#24. 23. The process of regularly updating and patching software to address known vulnerabilities is known as:

#25. 24. Which of the following is an example of a physical security measure in the context of information assurance?

#26. 25. The term "social engineering" refers to:

#27. 26. The process of backing up data regularly and storing it in a separate location is a strategy for:

#28. 27. What is the primary purpose of a proxy server in the context of internet security?

#29. 28. The concept of "sandboxing" involves:

#30. 29. The process of validating the integrity and authenticity of digital messages or documents is achieved through:

#31. 30. The principle of "security through obscurity" suggests:

Finish