Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

FUNDAMENTALS OF INFORMATION SECURITY 2026 EXAM WITH CORRECT ANSWERS GRADED A+

Beoordeling
-
Verkocht
-
Pagina's
40
Cijfer
A+
Geüpload op
24-01-2026
Geschreven in
2025/2026

FUNDAMENTALS OF INFORMATION SECURITY 2026 EXAM WITH CORRECT ANSWERS GRADED A+FUNDAMENTALS OF INFORMATION SECURITY 2026 EXAM WITH CORRECT ANSWERS GRADED A+

Instelling
FUNDAMENTALS OF INFORMATION SECURITY
Vak
FUNDAMENTALS OF INFORMATION SECURITY

Voorbeeld van de inhoud

FUNDAMENTALS OF INFORMATION
SECURITY 2026 EXAM WITH
CORRECT ANSWERS GRADED A+




Controls that protect the systems, networks, and environments that
process, transmit, and store our data are called _______. - ANSWER-
Logical Controls


During what phase of the incident response process do we determine
what happened, why it happened, and what we can do to keep it from
happening again? - ANSWER- Post-Incident Activity


Something that has the potential to cause harm to our assets is known as
a(n) ________. - ANSWER- Threat


What is the first and arguably one of the most important steps of the risk
management process? - ANSWER- Identify assess

,The Fabrication attack type most commonly affects which principle(s) of
the CIA triad? - ANSWER- Integrity and Availability


The Interception attack type most commonly affects which principle(s)
of the CIA triad? - ANSWER- Confidentiality


A badge or token is considered what type of authentication? -
ANSWER- Something you have


A password or PIN is considered what type of authentication? -
ANSWER- Something you know


The set of methods we use to establish a claim of identity as being true is
called ______. - ANSWER- Authentication


A fingerprint is considered what type of authentication? - ANSWER-
Something you are


What type of authentication can prevent a man-in-the-middle attack? -
ANSWER- Mutual


The biometric characteristic that measures how well a factor resists
change over time and with advancing age is called __________ -
ANSWER- Permanence

,What dictates that we should only allow the bare minimum of access, as
needed? - ANSWER- Principle of least privilege


Access controls are policies or procedures used to control access to
certain items. - ANSWER- True


What is implemented through the use of access controls? - ANSWER-
Authorization


Which answer best describes the authorization component of access
control? - ANSWER- Authorization is the process of determining
who is approved for access and what resources they are approved
for.


A client-side attack that involves the attacker placing an invisible layer
over something on a website that the user would normally click on, in
order to execute a command differing from what the user thinks they are
performing, is known as ___________. - ANSWER- Clickjacking


What type of access control can prevent the confused deputy problem? -
ANSWER- Capability-based security


A user who creates a network share and sets permissions on that share is
employing which model of access control? - ANSWER- Discretionary
access control

, A VPN connection that is set to time out after 24 hours is demonstrating
which model of access control? - ANSWER- Attribute-based access
control


Confidential Services Inc. is a military-support branch consisting of
1,400 computers with Internet access and 250 servers. All employees are
required to have security clearances. From the options listed below, what
access control model would be most appropriate for this organization? -
ANSWER- Mandatory access control


What is information security? - ANSWER- Protecting information and
information systems from unauthorized access, use, disclosure,
disruption, modification, or destruction.


Using the concept of defense in depth we can protect ourselves against
someone using a USB flash drive to remove confidential data from an
office space within our building. - ANSWER- True


Select the example(s) of identity verification. (Choose all that apply.) -
ANSWER- SSN


Passport


Birth certificate


Multifactor authentication is the use of more than one authentication
method to access an information system. - ANSWER- True

Geschreven voor

Instelling
FUNDAMENTALS OF INFORMATION SECURITY
Vak
FUNDAMENTALS OF INFORMATION SECURITY

Documentinformatie

Geüpload op
24 januari 2026
Aantal pagina's
40
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$17.57
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
Anahsmith Walden University
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
21
Lid sinds
2 jaar
Aantal volgers
9
Documenten
1239
Laatst verkocht
2 maanden geleden

4.0

3 beoordelingen

5
1
4
1
3
1
2
0
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen