Skip to content
  • Home
  • CCNA Labs
    • CCNA 1 LAB Activities (v6 & v7)
    • CCNA 2 LAB Activities (v6 & v7)
    • CCNA 3 LAB Activities (v6 & v7)
    • CCNA 4 Lab Activities
  • Linux
    • Linux Unhatched
    • Linux Essentials 2.0
    • Linux Essentials
    • Introduction to Linux I
    • Introduction to Linux II
  • Programming
    • PCAP – Programming Essentials in Python
    • CLA – Programming Essentials in C
    • CPA Programming Essentials in C++
  • About
    • Contact Us
    • Privacy Policy

CCNA 7 Exam Answers 2023

Go with our CCIE, Passed 100%

  • ITE
    • ITE - IT Essentials v7.0
    • ITE - IT Essentials v6.0
      • IT Essentials Lab 2019
    • ITE v5.0 Exam
    • Virtual Activity Laptop
    • Virtual Activity Desktop
  • NE
    • MF
  • CCNA
    • CCNA1
      • CCNA1 v7.0 – ITN
      • CCNA1 v6.0
    • CCNA2
      • CCNA2 v7.0 – SRWE
      • CCNA2 v6.0
    • CCNA3
      • CCNA3 v7.0 – ENSA
      • CCNA3 v6.0
    • CCNA4
      • CCNA4 v6.0
  • Cyber-Security
    • ITC – Introduction to Cybersecurity 2.1 (Level 1)
    • CE – Cybersecurity Essentials 1.1 (Level 2)
    • CCNA CyberOps 1.1 (Level 3)
  • Security
    • CCNA Security v2
  • DevNet
  • CCNA PT Lab 2023

Cybersecurity Essentials 1.1 Chapter 2 Quiz Online

Last Updated on May 20, 2021 by Admin

Cybersecurity Essentials 1.1 Chapter 2 Quiz Online

CE -- Chapter 2 Quiz

Time limit: 0

Quiz-summary

0 of 20 questions completed

Questions:

  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20

Information

CE — Chapter 2 Quiz

You have already completed the quiz before. Hence you can not start it again.

Quiz is loading...

You must sign in or sign up to start the quiz.

You have to finish following quiz, to start this quiz:

Results

0 of 20 questions answered correctly

Your time:

Time has elapsed

You have reached 0 of 0 points, (0)

Average score
 
 
Your score
 
 

Categories

  1. Not categorized 0%
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  1. Answered
  2. Review
  1. Question 1 of 20
    1. Question
    2 points
    What are two common hash functions? (Choose two.)
    Correct

    Incorrect

    SHA and MD5 use use complex mathematical algorithms to compute hash values.

    Hint

    SHA and MD5 use use complex mathematical algorithms to compute hash values.

  2. Question 2 of 20
    2. Question
    1 points
    What service determines which resources a user can access along with the operations that a user can perform?
    Correct

    Incorrect

    Authorization determines whether a user has certain access privileges.

    Hint

    Authorization determines whether a user has certain access privileges.

  3. Question 3 of 20
    3. Question
    1 points
    What type of cybersecurity laws protect you from an organization that might want to share your sensitive data?
    Correct

    Incorrect

    Privacy laws control appropriate use of data and access to data.

    Hint

    Privacy laws control appropriate use of data and access to data.

  4. Question 4 of 20
    4. Question
    3 points
    What three design principles help to ensure high availability? (Choose three.)
    Correct

    Incorrect

    High availability systems typically include these three design principles.

    Hint

    High availability systems typically include these three design principles.

  5. Question 5 of 20
    5. Question
    3 points
    For the purpose of authentication, what three methods are used to verify identity? (Choose three.)
    Correct

    Incorrect

    The forms of authentication are something you know, have , or are.

    Hint

    The forms of authentication are something you know, have , or are.

  6. Question 6 of 20
    6. Question
    1 points
    What is a secure virtual network called that uses the public network?
    Correct

    Incorrect

    The term VPN describes a virtual network that uses encryption to protect data when traveling across Internet media.

    Hint

    The term VPN describes a virtual network that uses encryption to protect data when traveling across Internet media.

  7. Question 7 of 20
    7. Question
    1 points
    What mechanism can organizations use to prevent accidental changes by authorized users?
    Correct

    Incorrect

    Version control ensures that two users cannot update the same object.

    Hint

    Version control ensures that two users cannot update the same object.

  8. Question 8 of 20
    8. Question
    1 points
    What is a method of sending information from one device to another using removable media?
    Correct

    Incorrect

    Sneaker net refers to hand delivering the removable data.

    Hint

    Sneaker net refers to hand delivering the removable data.

  9. Question 9 of 20
    9. Question
    3 points
    What are the three foundational principles of the cybersecurity domain? (Choose three.)
    Correct

    Incorrect

    Three foundational security principles are confidentiality, integrity and availability.

    Hint

    Three foundational security principles are confidentiality, integrity and availability.

  10. Question 10 of 20
    10. Question
    3 points
    What are three access control security services? (Choose three.)
    Correct

    Incorrect

    This question refers to AAA authentication, authorization, and accountability.

    Hint

    This question refers to AAA authentication, authorization, and accountability.

  11. Question 11 of 20
    11. Question
    2 points
    Which two methods help to ensure data integrity? (Choose two.)
    Correct

    Incorrect

    Data integrity systems include one of the two data integrity methods.

    Hint

    Data integrity systems include one of the two data integrity methods.

  12. Question 12 of 20
    12. Question
    3 points
    What three tasks are accomplished by a comprehensive security policy? (Choose three.)
    Correct

    Incorrect

    Policy sets the establishment of rules and guidelines for the business.

    Hint

    Policy sets the establishment of rules and guidelines for the business.

  13. Question 13 of 20
    13. Question
    2 points
    What two methods help to ensure system availability? (Choose two.)
    Correct

    Incorrect

  14. Question 14 of 20
    14. Question
    1 points
    What principle prevents the disclosure of information to unauthorized people, resources, and processes?
    Correct

    Incorrect

    The security principle of confidentiality refers to the prevention of the disclosure of information to unauthorized people, resources, and processes.

    Hint

    The security principle of confidentiality refers to the prevention of the disclosure of information to unauthorized people, resources, and processes.

  15. Question 15 of 20
    15. Question
    3 points
    What are the three states of data? (Choose three.)
    Correct

    Incorrect

    The protection of the cyber world requires cybersecurity professionals to account for the safeguarding of data in-transit, in-cloud, and at rest.

    Hint

    The protection of the cyber world requires cybersecurity professionals to account for the safeguarding of data in-transit, in-cloud, and at rest.

  16. Question 16 of 20
    16. Question
    1 points
    What name is given to any changes to the original data such as users manually modifying data, programs processing and changing data, and equipment failures?
    Correct

    Incorrect

    Modification involves changes to the original data and not complete deletion of the data.

    Hint

    Modification involves changes to the original data and not complete deletion of the data.

  17. Question 17 of 20
    17. Question
    1 points
    What is identified by the first dimension of the cybersecurity cube?
    Correct

    Incorrect

    The first dimension of the cybersecurity sorcery cube identifies the goals or security principles required to protect the cyber world.

    Hint

    The first dimension of the cybersecurity sorcery cube identifies the goals or security principles required to protect the cyber world.

  18. Question 18 of 20
    18. Question
    1 points
    What name is given to a storage device connected to a network?
    Correct

    Incorrect

    NAS refers to a storage device connected to a network that allows storage and retrieval of data from a centralized location by authorized network users.

    Hint

    NAS refers to a storage device connected to a network that allows storage and retrieval of data from a centralized location by authorized network users.

  19. Question 19 of 20
    19. Question
    2 points
    What are two methods that ensure confidentiality? (Choose two.)
    Correct

    Incorrect

    Confidentiality means viewing of information only for those who need to know. This can be accomplished by encrypting data and authenticating users who request access.

    Hint

    Confidentiality means viewing of information only for those who need to know. This can be accomplished by encrypting data and authenticating users who request access.

  20. Question 20 of 20
    20. Question
    3 points
    What are three types of sensitive information? (Choose three.)
    Correct

    Incorrect

    Sensitive information is information that would otherwise cause harm to a company or individual if publicly disclosed.

    Hint

    Sensitive information is information that would otherwise cause harm to a company or individual if publicly disclosed.

  • CCNA1 v7
  • CCNA2 v7
  • CCNA3 v7
System Test Exam Answers
Modules 1 – 3 Exam Answers
Modules 4 – 7 Exam Answers
Modules 8 – 10 Exam Answers
Modules 11 – 13 Exam Answers
Modules 14 – 15 Exam Answers
Modules 16 – 17 Exam Answers
Practice Final – ITN Answers
Course Feedback
ITN Practice PT Skills Assessment (PTSA)
Final Exam Answers
Modules 1 – 4 Exam Answers
Modules 5 – 6 Exam Answers
Modules 7 – 9 Exam Answers
Modules 10 – 13 Exam Answers
Modules 14 – 16 Exam Answers
ITN Practice Skills Assessment – PT Answers
SRWE Practice Skills Assessment – PT Part 1 Answers
SRWE Practice Skills Assessment – PT Part 2 Answers
SRWE Hands On Skills Exam Answers
SRWE Practice Final Exam Answers
SRWE Final Exam Answers 
Modules 1 – 2 Exam Answers
Modules 3 – 5 Exam Answers
Modules 6 – 8 Exam Answers
Modules 9 – 12 Exam Answers
Modules 13 – 14 Exam Answers
ITN Practice PT Skills Assessment (PTSA) Answers
SRWE Practice PT Skills Assessment (PTSA) – Part 1 Answers
SRWE Practice PT Skills Assessment (PTSA) – Part 2 Answers
ENSA Practice PT Skills Assessment (PTSA) Answers
ENSA Hands On Skills Exam Answers
Practice Final – ENSA Answers
ENSA Final Exam Answers
CCNA Certification Practice Exam Answers

Copyright © 2023 PressExam.