Implementing and Operating Cisco Security Core Technologies (SCOR) Quiz Questions and Answers

This is the model designed for guiding the policies of Information security within a company, firm, or organization. What is “this” referred to here?

Answer :
  • CIA Triad

Explanation :

Various security models were being developed till date. This is by far the most popular and widely used model which focuses on the information’s confidentiality, integrity as well as availability and how these key elements can be preserved for a better se

_____ means the protection of data from modification by unknown users.

Answer :
  • Integrity

Explanation :

A information only seems valuable if it is correct and do not get modified during its journey in the course of arrival. The element integrity makes sure that the data sent or generated from other end is correct and is not modified by any unauthorised part

When you use the word_______it means you are protecting your data from getting disclosed.

Answer :
  • Confidentiality

Explanation :

Confidentiality is what every individual prefer in terms of physical privacy as well as digital privacy. This term means our information needs to be protected from getting disclose to unauthorised parties, for which we use different security mechanisms li

There are how many types of VPN protocols?

Answer :
  • 6

Explanation :

There are six types of protocols used in VPN. These are Internet Protocol Security or IPSec, Layer 2 Tunnelling Protocol (L2TP), Point – to – Point Tunnelling Protocol (PPTP), Secure Sockets Layer (SSL), OpenVPN and Secure Shell (SSH).

______ is the latest technology that faces an extra challenge because of the CIA paradigm.

Answer :
  • Big data

Explanation :

Big data has additional challenges that it has to face because of the tremendous volume of data that needs protection as well as other key elements of the CIA triad, which makes the entire process costly and time-consuming.

_______ of information means, only authorized users are capable of accessing the information.

Answer :
  • Availability

Explanation :

Information seems useful only when right people (authorised users) access it after going through proper authenticity check. The key element availability ensures that only authorised users are able to access the information.

Site-to-Site VPN architecture is also known as_______.

Answer :
  • Extranet based VPN

Explanation :

Site-to-site VPN architecture is also known as extranet based VPNs because these type of VPNs are typically used to connect firms externally between different branches of the same company.

Which device or software or technology can hide a user’s browsing activity?

Answer :
  • VPN

Explanation :

VPNs are used for hiding user’s browsing activities and maintain anonymity. This also helps in preventing user’s personal browsing data leakage and protects the leakage of browsing habits.

Which types of VPNs are used for corporate connectivity across companies residing in different geographical locations?

Answer :
  • Site-to-site VPNs

Explanation :

Site-to-site VPNs are also known as Router-to-router VPNs which are typically used in companies and firms for connecting remotely different branches with different geographical locations.

Which is used for hiding the user’s physical location?

Answer :
  • VPN

Explanation :

VPNs are used for hiding your physical location which helps in maintaining anonymity. Using IP address and browsing habits, link search, your physical location can be traced.