Implementing and Operating Cisco Security Core Technologies (SCOR) Quiz Questions and Answers
This is the model designed for guiding the policies of Information security within a company, firm, or organization. What is “this” referred to here?
Answer :
CIA Triad
Explanation :
Various security models were being developed till date. This is by far the most popular and widely used model which focuses on the information’s confidentiality, integrity as well as availability and how these key elements can be preserved for a better se
_____ means the protection of data from modification by unknown users.
Answer :
Integrity
Explanation :
A information only seems valuable if it is correct and do not get modified during its journey in the course of arrival. The element integrity makes sure that the data sent or generated from other end is correct and is not modified by any unauthorised part
When you use the word_______it means you are protecting your data from getting disclosed.
Answer :
Confidentiality
Explanation :
Confidentiality is what every individual prefer in terms of physical privacy as well as digital privacy. This term means our information needs to be protected from getting disclose to unauthorised parties, for which we use different security mechanisms li
There are six types of protocols used in VPN. These are Internet Protocol Security or IPSec, Layer 2 Tunnelling Protocol (L2TP), Point – to – Point Tunnelling Protocol (PPTP), Secure Sockets Layer (SSL), OpenVPN and Secure Shell (SSH).
______ is the latest technology that faces an extra challenge because of the CIA paradigm.
Answer :
Big data
Explanation :
Big data has additional challenges that it has to face because of the tremendous volume of data that needs protection as well as other key elements of the CIA triad, which makes the entire process costly and time-consuming.
_______ of information means, only authorized users are capable of accessing the information.
Answer :
Availability
Explanation :
Information seems useful only when right people (authorised users) access it after going through proper authenticity check. The key element availability ensures that only authorised users are able to access the information.
Site-to-Site VPN architecture is also known as_______.
Answer :
Extranet based VPN
Explanation :
Site-to-site VPN architecture is also known as extranet based VPNs because these type of VPNs are typically used to connect firms externally between different branches of the same company.
Which device or software or technology can hide a user’s browsing activity?
Answer :
VPN
Explanation :
VPNs are used for hiding user’s browsing activities and maintain anonymity. This also helps in preventing user’s personal browsing data leakage and protects the leakage of browsing habits.
Which types of VPNs are used for corporate connectivity across companies residing in different geographical locations?
Answer :
Site-to-site VPNs
Explanation :
Site-to-site VPNs are also known as Router-to-router VPNs which are typically used in companies and firms for connecting remotely different branches with different geographical locations.
Which is used for hiding the user’s physical location?
Answer :
VPN
Explanation :
VPNs are used for hiding your physical location which helps in maintaining anonymity. Using IP address and browsing habits, link search, your physical location can be traced.