Sy0-301 - Elementk 1ai (Security Fundamentals)

11 Questions | Total Attempts: 123

SettingsSettingsSettings
Please wait...
Element Quizzes & Trivia

"Identify the components of the information security cycle" 5 Questions 1 - Security Fundamentals A - The Information Security Cycle i - Identifying Information Security Building Blocks


Questions and Answers
  • 1. 
    Detail the differences between a threat, vulnerability, and risk. 
  • 2. 
    As an information security officer, what are the information security goals that you need to keep in mind while defining the protection you will need? (Select all that apply.)
    • A. 

      Prevention

    • B. 

      Auditing

    • C. 

      Recovery

    • D. 

      Detection

  • 3. 
     What are applicable forms of vulnerabilities? (Select all that apply.)
    • A. 

      Improperly configured software

    • B. 

      Misuse of communication protocols

    • C. 

      Damage to hardware

    • D. 

      Lengthy passwords with a mix of characters

  • 4. 
    A condition that leaves a system open to attack. Match each fundamental security concept with its corresponding description.
    • A. 

      Vulnerability

    • B. 

      Threat

    • C. 

      Risk

    • D. 

      Control

    • E. 

      Intrusion

  • 5. 
    An event or action that could potentially result in the violation of a security requirement. Match each fundamental security concept with its corresponding description.
    • A. 

      Vulnerability

    • B. 

      Threat

    • C. 

      Risk

    • D. 

      Control

    • E. 

      Intrusion

  • 6. 
    Exposure to the chance of damage or loss. Match each fundamental security concept with its corresponding description.
    • A. 

      Vulnerability

    • B. 

      Threat

    • C. 

      Risk

    • D. 

      Control

    • E. 

      Intrusion

  • 7. 
    A countermeasure that you need to put in place to avoid, mitigate, or counteract a security risks due to a threat or attack. Match each fundamental security concept with its corresponding description.
    • A. 

      Vulnerability

    • B. 

      Threat

    • C. 

      Risk

    • D. 

      Control

    • E. 

      Intrusion

  • 8. 
    An event where an attacker has access to your computer system without an authorization. Match each fundamental security concept with its corresponding description.
    • A. 

      Vulnerability

    • B. 

      Threat

    • C. 

      Risk

    • D. 

      Control

    • E. 

      Intrusion

  • 9. 
    Select the appropriate method to protect systems. Match each security description(s) to its security management process.  
    • A. 

      Identification

    • B. 

      Monitoring

    • C. 

      Implementation

  • 10. 
    Analyze important steps that improve the performance of controls. Match each security description(s) to its security management process.  
    • A. 

      Identification

    • B. 

      Monitoring

    • C. 

      Implementation

  • 11. 
    Install the selected control mechanism. Match each security description(s) to its security management process.  
    • A. 

      Identification

    • B. 

      Monitoring

    • C. 

      Implementation