Thanks for Visiting my channel
FCF - Introduction to the Threat Landscape 2.0 Self-Paced
Module 1: Introduction to Cybersecurity Quiz Answers – Fortinet
Which definition accurately describes information security (InfoSec)?
The practice of protecting computer networks, devices, and digital information, whether on-premises or in the cloud.
The management of critical infrastructure, such as pipelines, electrical power grids, and data centers in the cloud.
The processes for preventing, detecting, and remediating attacks on sensitive information, both digital and physical.
The control of physical access to a building or room where sensitive data is stored, either digitally or physically.
Which definition accurately describes cybersecurity?
The protection of information systems against unauthorized access, modification, and so on
The management of critical infrastructure, such as pipelines and electrical power grids
The practice of protecting computer networks, devices, and digital information
The protection of all information that has been deemed sensitive
Which cybersecurity term does one of the letters in AAA stand for?
Anonymity
Alerts
Accounting
Acceptability
What is one of the first things that you need to do before implementing safeguards to information?
Verify with government regulations if information requires protection.
Determine what information needs to be protected.
Conduct criminal record checks on all employees.
Carry out a data integrity check on all sensitive data.
Which is the most accurate definition of authentication in cybersecurity?
The practice of verifying activities on computer devices
The act of certifying that someone can perform an action
The act of identifying and verifying a person or thing
The process of controlling access to resource
In addition to the five categories of cybersecurity, what else do you need to consider when defending the cyber space?
Executive strategic planning
Computer code
ISO standards
People and processes
Which is the most accurate definition of authorization in cybersecurity?
The act of identifying and verifying a person or thing
The act of certifying that someone can perform an action
The practice of verifying activities on computer devices
The process of controlling access to resources
What are the three principles of information security (InfoSec), also known as the CIA triad? (Choose three.)
Accountability
Availability
Integrity
Incorruptibility
Confidentiality
Which two elements of cybersecurity must be addressed when defending computer networks? (Choose two.)
Physical access points
Computer technology vulnerabilities
Human behavior
Information left on desks or in public places
What are two categories of cybersecurity? (Choose two.)
Critical infrastructure
Security accreditation for employees
Network security
Building access security
Which three principals make up the DAD triad? (Choose three.)
Disclosure
Denial
Alteration
Anonymized data
Domain spoofing
Which definition accurately describes information systems security?
The practice of protecting computer networks, devices, and digital information
The management of information systems, including disaster recovery (DR) and high availability (HA)
The control of physical access to a building or room where sensitive data is stored
The protection of information systems against unauthorized access, modification, and so on
FCF – Introduction to the Threat Landscape 2.0 Self-Paced
No comments:
Post a Comment