Week 6 CCISO Domain – With____, you rent IT infrastructure servers

Question

Dot Image

Central Washington University Week 6 CCISO Domain Questions

1) With____, you rent IT infrastructure servers and VMs, storage, networks, opertaing systems form cloud provider on pay-as-you-go basis.  

  1. Platform as a Service (PaaS) 
  1. Software as a Service (SaaS) 
  1. Infrastructure as a Service (IaaS) 
  1. Security as a Service ( SECaaS) 

 

2)This type of encryption uses one key to encrypt and decrypt. 

  1. All the listed choices are correct 
  1. Asymmetric encryption 
  1. Symmetric encryption 
  1. Hashing 

 

3) What is the most important date security measure you can take for mobile devices? 

  1. Data backup 
  1. Two factor authentications 
  1. Use of VPN 
  1. Full hard drive encryption 

 

4)Which layer of the OSI Model ensures that the packets are received without errors and in the correct order? 

  1. Transport layer 
  1. Data-linked layer 
  1. Session layer 
  1. Network layer 

 

5) This is a software tool or service that sits between an organization’s on-premises infrastructure and a cloud provider’s infrastructure allowing the organization to extend the reach of their security policies beyond their own infrastructure. 

  1. Cloud Access Security Broker (CASB) 
  1. Intrusion Detection System (IDS) 
  1. DNS server 
  1. Web Application Firewall (WAF) 

 

6) A _______ typically establishes a barrier between a trusted, secure internal network and another outside network, such as the internet, that is assumed to not be secure or trusted.  

  1. Firewall 
  1. Network Intrusion Detection System 
  1. Edge router 
  1. Virtual private network (VPN) 

 

7) _______ is an integrity control 

  1. None of the listed choices are correct 
  1. Public Key infrastructure  
  1. Hashing 
  1. Encryption 

8) Which of the following is one of the most effective data protection methods for both data-in-transit and data-at-rest? 

  1. MD5 Hashing 
  1. Encryption 
  1. Transport Layer Security (TLS) 
  1. Digital Certificates 

 

9) This strategy combines something you have, something you know, or something you are in the authentication process. 

  1. Least Privilege Principle 
  1. Multifactor Authentication 
  1. Authenticator Management 
  1. Identity management. 

 

10) This defines the process of granting permission to a user or object to perform or obtain something? 

  1. Authentication 
  1. Auditing 
  1. Authorization 
  1. Access Control Restrictions 

 

11) You are using asymmetric encryption to send a private message. Which key would you use to encrypt the message? 

  1. Recipient’s private key 
  1. Sender’s private key 
  1. Recipients’ public key 
  1. Sender’s public key 

 

12) Which of the following security controls is used to extend the network perimeter with the use of encapsulation and encryption?  

  1. Network intrusion detection system (NIDS) 
  1. Network Address Translation (NAT) 
  1. Virtual Private Network (VPN) 
  1. Web proxy 

 

13) Which access control model provides access control based on the position or responsibility an individual fills within an organization? 

  1. Mandatory Access control 
  1. Attribute-based Access control 
  1. Discretionary Access Control 
  1. Role-based Control 

 

14)Which access control model is the least restrictive model, popular in situations where resource owners need to allow access and privileges OnDemand?  

  1. Role-based Access Control 
  1. Mandatory Access control 
  1. Attribute- based access control 
  1. Discretionary access control 

 

15) Access control auditing to track and report on user activity supports the following purposes: 

  1. Compliance and security reporting 
  1. SIEM use cases 
  1. Compliance and Security Reporting plus SIEM Use Cases 
  1. Identity management 

 

16) VPNs operate at which layer of the OSI model? 

  1. Layer 5: Session layer 
  1. Layer 3: Network layer 
  1. Layer 2: Data-link layer 
  1. Layer 4: Transport layer 

 

17) Which access control model is most flexible and fine grained of all access control types. Access can be granted by IP address, time, dates, resources, objects, privileges, or any combination?  

  1. Discretionary Access Control 
  1. Mandatory Access control 
  1. Attribute-based Access Control 
  1. Role-base Access control 

 

18) You are analyzing a packet and see that it was being routed using a media access control (MAC) address. At which layer of the OSI model was the packet captured? 

  1. Network layer 
  1. Session layer 
  1. Data-link layer 
  1. Transport layer  

Dot Image

Having Trouble Meeting Your Deadline?

Get your assignment on Week 6 CCISO Domain – With____, you rent IT infrastructure servers completed on time. avoid delay and – ORDER NOW

Order Solution Now

Similar Posts