Test 13 Flashcards

(25 cards)

1
Q

Which of the answers listed below refers to a protocol used to set up secure connections and exchange of cryptographic keys in IPsec VPNs?

A

IKE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which part of the IPsec protocol suite provides data integrity and authentication but not encryption?

A

AH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which part of IPsec provides confidentiality, data integrity, and authentication?

A

ESP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the IPsec modes provides entire packet encryption?

A

Tunnel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

An IPsec mode providing encryption only for the payload (the data part of the packet) is referred to as:

A

Transport mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

The term “SD-WAN” refers to a network technology that uses software to manage and optimize network connections that extend over large geographic areas.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following answers refers to a cybersecurity framework that combines network and security functions into a single cloud-based service?

A

SASE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the answers listed below refers to any type of information pertaining to an individual that can be used to uniquely identify that person?

A

PII

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following regulates personal data privacy of the EU citizens?

A

GDPR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The US Health Insurance Portability and Accountability Act (HIPAA) provides privacy protection for:

A

PHI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The purpose of PCI DSS is to provide protection for:

A

Credit cardholder data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the answers listed below refer(s) to encryption method(s) used to protect data at rest? (Select all that apply)

A

FDE
SED
EFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Encryption methods used to protect data in transit include: (Select all that apply)

A

VPN
IPsec
TLS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following data states typically requires data to be processed in an unencrypted form?

A

Data in use

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the answers listed below refer to examples of non-human readable data types? (Select 2 answers)

A

Binary code
Machine language

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which of the following answers refers to an individual or role responsible for overseeing and ensuring compliance with data protection laws and policies within an organization?

17
Q

A mobile device’s built-in functionality enabling the usage of locator applications is known as:

18
Q

Which of the answers listed below refers to a technology that provides control over the usage of a mobile device within a designated area?

19
Q

Which of the following converts plaintext data into ciphertext using an algorithm and a key?

20
Q

Which of the answers listed below refers to a technique that enables converting input data into a fixed-size string, making it difficult to reverse or retrieve the original data?

21
Q

Which of the following answers refer to data masking? (Select 2 answers)

A

Replaces sensitive data with fictitious or modified data while retaining its original format ( Missed)
Allows for data manipulation in environments where the actual values are not needed

22
Q

Which of the answers listed below refers to a situation where sensitive data is stored in a separate location and can be retrieved with a non-sensitive replacement that can also be processed just like the original data without the risk of revealing the contents of original data?

23
Q

Which of the following modifies data or code to make it difficult to understand or reverse-engineer, but without necessarily encrypting or hiding the data?

24
Q

Which of the answers listed below refer to the advantages of segmentation as a method for securing data? (Select 3 answers)

A

Enhances security by limiting the spread of cyberattacks ( Missed)
Helps organizations comply with data regulatory requirements by isolating and protecting specific data types ( Missed)
Provides better control over user access to sensitive data

25
ACL, FACL, DAC, MAC, and RBAC are all access control mechanisms that can be used to manage user permissions and protect the confidentiality, integrity, and availability of data.
True