What does CIA stand for in the context of information security?
a) Central Intelligence Agency
b) Confidentiality, Integrity, Availability
c) Cyber Intelligence Assessment
d) Critical Information Analysis - Answers b: Confidentiality, Integrity, Availability
Which component of the CIA Triad focuses on keeping data accessible to authorized users?
a) Confidentiality
b) Integrity
c) Availability
d) Authentication - Answers c: Availability
True or False: The CIA Triad is primarily used by conspiracy theorists. - Answers false
Which of the following is an example of maintaining confidentiality?
a) Regular system backups
b) Two-factor authentication
c) Data validation checks
d) Load balancing - Answers b: Two-factor authentication
How can the CIA Triad help organizations after a security incident?
a) By providing a clear checklist for evaluation
b) By increasing network speed
) By automatically fixing vulnerabilities
d) By contacting law enforcement - Answers a: By providing a clear checklist for evaluation
Which of these is NOT typically considered part of the CIA Triad?
a) Confidentiality
b) Integrity
c) Availability
d) Accountability - Answers d: Accountability
True or False: The CIA Triad can help inform an organization's security policies and procedures. -
Answers true
In the context of e-commerce, asking for a password when logging in primarily addresses which
aspect of the CIA Triad?
a) Confidentiality
b) Integrity
c) Availability
d) None of the above - Answers a: Confidentiality
What is inserted between the physical server resources and virtual servers in software-based
virtualization?
a) Hypervisor
b) Virtual machine
c) Virtualization layer
d) Guest operating system - Answers c: Virtualization layer
What are the four core components of hardware resources emphasized in virtualization?
a) CPU, memory, network, and disk resources
b) RAM, GPU, SSD, and motherboard
c) Processor, hard drive, keyboard, and monitor
d) Cache, BIOS, power supply, and cooling system - Answers a: CPU, Memory, network, and disk
resources
What is another term used for the virtualization layer?
a) Virtual Machine Monitor (VMM)
b) Host System
c) Guest Operating System
d) Virtual CPU - Answers a: Virtual Machine Monitor (VMM)
In virtualization terminology, what is the physical server called?
a) Virtual Machine
b) Host
c) Guest
, d) Hypervisor - Answers b: host
True or False: Virtual machines on the same host can access each other's data freely. - Answers false
What makes it easy for administrators to back up virtual machines?
a) They require special backup software
b) They consist of only a few files (configuration, disk, and log)
c) They can't be backed up
d) They automatically back themselves up - Answers b: They consist of only a few files (configuration,
disk, and log)
What allows virtual machines to be fully separated and isolated from each other?
a) The host operating system
b) The virtualization layer
c) The guest operating system
d) The network interface - Answers b: The virtualization layer
True or False: The hardware resources allocated to a virtual machine can be changed during ongoing
operations. - Answers true
What component does all access from a virtual machine to the physical hardware pass through?
a) CPU
b) Memory
c) Virtualization layer
d) Network interface - Answers c: Virtualization layer
According to the article, a virtual machine created on one server model (e.g., PRIMERGY RX300 S4)
can be run on a different model (e.g., PRIMERGY RX600 S4). What makes this possible?
a) The virtualization layer's separation of VMs from hardware dependencies
b) The identical hardware in both server models
c) Special transfer software
d) The guest operating system's adaptability - Answers a: he virtualization layer's separation of VMs
from hardware dependencies
What is Git primarily designed for?
a) Database management
b) Version control
c) Web development
d) Network administration - Answers b: Version control
Who created Git?
a) Bill Gates
b) Linus Torvalds
c) Mark Zuckerberg
d) Steve Jobs - Answers b: Linus Torvalds
What percentage of developers reported using Git as their primary version control system as of 2022?
a) 75%
b) 85%
c) 95%
d) 100% - Answers c: 95%
Which of the following is NOT one of the three main states of files in Git?
a) Modified
b) Staged
c) Committed
d) Archived - Answers d:Archived
What does Git store instead of file differences?
a) File metadata
b) Snapshots of the project
c) Only the changes made
d) Compressed file versions - Answers b: Snapshots of the project
What is a key advantage of Git's distributed nature?
a) It requires less storage space
b) It's faster than centralized systems
c) It allows for offline work
d) It's easier to set up - Answers c: It allows for offline work