Explore the Answers to Cybersecurity Essentials Module 2 QuizDiscover the comprehensive answers to the Cybersecurity P3: Principles, Practices and Processe quiz. Enhance your understanding of crucial security concepts and test your knowledge in this informative guide. Stay ahead in cybersecurity education with accurate responses to Module 1’s essential quiz questions.
Contents
- 1 Cybersecurity P3: Principles, Practices and Processes Quiz Answers
- 1.1 1. What name is given to any changes made to original data, such as data being modified manually? (Select two answers)
- 1.2 2. Which of the following methods help to ensure data integrity? (Select two answers)
- 1.3 3. What name is given to a storage device connected to a network?
- 1.4 4. Which of the following methods help to ensure system availability? (Select two answers)
- 1.5 5. What is an advantage of using a hashing function?
- 1.6 6. What is the name of the method in which letters are rearranged to create a ciphertext?
- 1.7 7. Which of these protocols use asymmetric key algorithms? (Select three answers)
- 1.8 8. @Apollo has created a new program and wants to distribute it to everyone in the organization. They want to ensure that when the program is downloaded, it is not changed while in transit. What can @Apollo do to ensure this does not happen?
- 1.9 9. What term is used to describe concealing data in another file such as a graphic, audio or video file?
- 1.10 10. Which of the following are examples of administrative access controls? (Select three answers)
Cybersecurity P3: Principles, Practices and Processes Quiz Answers
1. What name is given to any changes made to original data, such as data being modified manually? (Select two answers)
- Backup
- Deletion
- Corruption
- Dissemination
- Integrity
- Modification
2. Which of the following methods help to ensure data integrity? (Select two answers)
- Hashing
- Data consistency checks
- Authorization
- Repudiation
- Availability
- Privacy
3. What name is given to a storage device connected to a network?
- RAID
- DAS
- NAS
- SAN
- Cloud
4. Which of the following methods help to ensure system availability? (Select two answers)
- Updating operating systems
- Equipment maintenance
- System resiliency
- Fire extinguishers
- Integrity checking
- System backups
5. What is an advantage of using a hashing function?
- It has a variable length output
- Two different files can be created that have the same output
- It is a one-way function and not reversible
- It is not commonly used in security
- It can take only a fixed length message
6. What is the name of the method in which letters are rearranged to create a ciphertext?
- Substitution
- Transposition
- One-time pad
- Enigma
7. Which of these protocols use asymmetric key algorithms? (Select three answers)
- Telnet
- Secure File Transfer Protocol (SFTP)
- Secure Sockets Layer (SSL)
- Advanced Encryption Standard (AES)
- Secure Shell (SSH)
- Pretty Good Privacy (PGP)
8. @Apollo has created a new program and wants to distribute it to everyone in the organization. They want to ensure that when the program is downloaded, it is not changed while in transit. What can @Apollo do to ensure this does not happen?
- Turn off antivirus on all the computers
- Distribute the program on a thumb drive
- Encrypt the program and require a password after it is downloaded
- Install the program on individual computers
- Create a hash of the program file that can be used to verify the integrity of the file after it is downloaded
9. What term is used to describe concealing data in another file such as a graphic, audio or video file?
- Steganography
- Hiding
- Masking
- Obfuscation
10. Which of the following are examples of administrative access controls? (Select three answers)
- Encryption
- Intrusion detection systems (IDS)
- Policies and procedures
- Background checks
- Guard dogs
- Hiring practices










