[Certification]/[FCF] Fortinet Certified Fundamentals

[FCF] Threat Landscape - Module 1 : Quesion&Answer

starterr 2024. 5. 4. 18:05

Module 1: Introduction to Cybersecurity

Q. What are the three principles of information security (InfoSec), also known as the CIA triad? (Choose three.)
Select one or more:

- Incorruptibility
- Confidentiality
- Integrity
- Availability
- Accountability


Q. Which definition accurately describes information systems security?
Select one:

- The control of physical access to a building or room where sensitive data is stored
- The practice of protecting computer networks, devices, and digital information
- The protection of information systems against unauthorized access, modification, and so on
- The management of information systems, including disaster recovery (DR) and high availability (HA)


Q. In addition to the five categories of cybersecurity, what else do you need to consider when defending the cyber space?
Select one:

- ISO standards
- Executive strategic planning
- People and processes
- Computer code


Q. Which cybersecurity term does one of the letters in AAA stand for?
Select one:

- Acceptability
- Accounting
- Alerts
- Anonymity


Q. What are two categories of cybersecurity? (Choose two.)
Select one or more:

- Building access security
- Network security
- Security accreditation for employees
- Critical infrastructure

 



Q. What is one of the first things that you need to do before implementing safeguards to information?
Select one:

- Conduct criminal record checks on all employees.
- Carry out a data integrity check on all sensitive data.
- Determine what information needs to be protected.
- Verify with government regulations if information requires protection.

 

Q. Which definition accurately describes cybersecurity?
Select one:

- The practice of protecting computer networks, devices, and digital information
- The management of critical infrastructure, such as pipelines and electrical power grids
- The protection of information systems against unauthorized access, modification, and so on
- The protection of all information that has been deemed sensitive

반응형


Q. Which three principals make up the DAD triad? (Choose three.)
Select one or more:

- Domain spoofing
- Denial
- Anonymized data
- Alteration
- Disclosure


Q.Which is the most accurate definition of authentication in cybersecurity?
Select one:

- The act of certifying that someone can perform an action
- The process of controlling access to resource
- The act of identifying and verifying a person or thing
- The practice of verifying activities on computer devices


Q.Which two elements of cybersecurity must be addressed when defending computer networks? (Choose two.)
Select one or more:

- Computer technology vulnerabilities
- Physical access points
- Human behavior
- Information left on desks or in public places


Q. Which is the most accurate definition of authorization in cybersecurity?
Select one:

- The process of controlling access to resources
- The act of certifying that someone can perform an action
- The practice of verifying activities on computer devices
- The act of identifying and verifying a person or thing


Q. Which two elements of cybersecurity must be addressed when defending computer networks? (Choose two.)
Select one or more:

- Information left on desks or in public places
- Computer technology vulnerabilities
- Human behavior
- Physical access points

 

Q. Which definition accurately describes information security (InfoSec)?
Select one:

- The processes for preventing, detecting, and remediating attacks on sensitive information, both digital and physical
- The management of critical infrastructure, such as pipelines, electrical power grids, and data centers in the cloud
- The practice of protecting computer networks, devices, and digital information, whether on-remises or in the cloud
- The control of physical access to a building or room where sensitive data is stored, either digitally or physically

 

 

Introduction to the Threat Landscape 모듈1 퀴즈와 정답이고,

틀린 부분 댓글로 달아주시면 수정하겠습니다.

 

[FCF] Threat Landscape - Module 1 : Introduction to Cybersecurity (사이버 보안)

 

[FCF] Threat Landscape - Module 1 : Introduction to Cybersecurity (사이버 보안)

A. 사이버보안 개요1. 사이버 보안이란? 사이버 보안은 컴퓨터 시스템, 네트워크 및 여기에 포함된 정보를 보호하는 집합적인 방법, 기술 및 프로세스입니다. 또한, 사이버 보안은 기술 외에도

infoofit.tistory.com

 

[FCF] Threat Landscape - Module 2 : Quesion&Answer

 

[FCF] Threat Landscape - Module 2 : Quesion&Answer

Q. Which expression would best qualify as threat intelligence? Select one: - A list of malicious IP addresses and domain names- Data feeds from a Security Information and Event Manager (SIEM)- Security implications and actionable advice- News of a cyberat

infoofit.tistory.com

 

반응형