Module 1: Introduction to Cybersecurity Quiz Answers – Fortinet
Which definition accurately describes information security (InfoSec)?
- The practice of protecting computer networks, devices, and digital information, whether on-premises or in the cloud.
- The management of critical infrastructure, such as pipelines, electrical power grids, and data centers in the cloud.
- The processes for preventing, detecting, and remediating attacks on sensitive information, both digital and physical.
- The control of physical access to a building or room where sensitive data is stored, either digitally or physically.
Which definition accurately describes cybersecurity?
- The protection of information systems against unauthorized access, modification, and so on
- The management of critical infrastructure, such as pipelines and electrical power grids
- The practice of protecting computer networks, devices, and digital information
- The protection of all information that has been deemed sensitive
Which cybersecurity term does one of the letters in AAA stand for?
- Anonymity
- Alerts
- Accounting
- Acceptability
What is one of the first things that you need to do before implementing safeguards to information?
- Verify with government regulations if information requires protection.
- Determine what information needs to be protected.
- Conduct criminal record checks on all employees.
- Carry out a data integrity check on all sensitive data.
Which is the most accurate definition of authentication in cybersecurity?
- The practice of verifying activities on computer devices
- The act of certifying that someone can perform an action
- The act of identifying and verifying a person or thing
- The process of controlling access to resource
In addition to the five categories of cybersecurity, what else do you need to consider when defending the cyber space?
- Executive strategic planning
- Computer code
- ISO standards
- People and processes
Which is the most accurate definition of authorization in cybersecurity?
- The act of identifying and verifying a person or thing
- The act of certifying that someone can perform an action
- The practice of verifying activities on computer devices
- The process of controlling access to resources
What are the three principles of information security (InfoSec), also known as the CIA triad? (Choose three.)
- Accountability
- Availability
- Integrity
- Incorruptibility
- Confidentiality
Which two elements of cybersecurity must be addressed when defending computer networks? (Choose two.)
- Physical access points
- Computer technology vulnerabilities
- Human behavior
- Information left on desks or in public places
What are two categories of cybersecurity? (Choose two.)
- Critical infrastructure
- Security accreditation for employees
- Network security
- Building access security
Which three principals make up the DAD triad? (Choose three.)
- Disclosure
- Denial
- Alteration
- Anonymized data
- Domain spoofing
Which definition accurately describes information systems security?
- The practice of protecting computer networks, devices, and digital information
- The management of information systems, including disaster recovery (DR) and high availability (HA)
- The control of physical access to a building or room where sensitive data is stored
- The protection of information systems against unauthorized access, modification, and so on
FCF – Introduction to the Threat Landscape 2.0 Self-Paced