최신 Courses and Certificates Network-and-Security-Foundation 무료샘플문제:
1. A company's internal messaging system is being redesigned. The authentication procedures were so cumbersome that employees were using personal email to communicate.
What is the security principle implemented in this scenario?
A) Fail-safe
B) Least common mechanism
C) Psychological acceptability
D) Zero-trust model
2. An organization does not have controls in place to limit employee access to sensitive customer data.
What is a component of the CIA triad that is violated?
A) Availability
B) Confidentiality
C) Integrity
D) Interpretation
3. What is an IT infrastructure security tenet of the CIA triad that counters passive attacks that aim to steal or intercept data?
A) Adaptation
B) Availability
C) Confidentiality
D) Integrity
4. A company is ensuring that its network protocol meets encryption standards.
What is the CIA triad component targeted in the scenario?
A) Availability
B) Confidentiality
C) Consistency
D) Integrity
5. A developer is using shared functions for software code in order to reduce complexity, knowing that greater complexity and volume of code are harder to defend against attacks.
Which security principle is demonstrated in this scenario?
A) Least privilege
B) Least common mechanism
C) Economy of mechanism
D) Zero-trust model
질문과 대답:
질문 # 1 정답: C | 질문 # 2 정답: B | 질문 # 3 정답: C | 질문 # 4 정답: B | 질문 # 5 정답: C |