It6206a Prelim Exam - Attempt Review
It6206a Prelim Exam - Attempt Review
It6206a Prelim Exam - Attempt Review
Question 1
Correct
It means nonpublic information that Microsoft designates as being confidential or which, under the circumstances surrounding
disclosure ought to be treated as confidential by the Recipient.
Question 2
Correct
It often has confidential information clause(s), which is (are) inserted to protect the information they deem proprietary and sensitive
from disclosure to unauthorized third parties.
Question 3
Correct
Select one:
True
False
https://trimestralexam.amaesonline.com/2313/mod/quiz/review.php?attempt=75448&cmid=1678&showall=1 1/13
10/20/23, 10:48 PM PRELIM EXAM: Attempt review
Question 4
Correct
Despite the seemingly benign threats in these regions, travelers are still advised to practice caution and to stay aware of threats to
their person, especially if traveling during the Asia-Pacific typhoon season.
Select one:
True
False
Question 5
Correct
One should keep a second set of keys in a safe place because the information can be lost or taken advantage of if he cannot access it
or if he cannot access it on time in case of loss or theft of the first set of keys.
Question 6
Incorrect
They are also recommended to upgrade computer systems and ensure programs continue to work through maintenance and testing.
Question 7
Correct
These are software that prevents malware from penetrating the machines.
https://trimestralexam.amaesonline.com/2313/mod/quiz/review.php?attempt=75448&cmid=1678&showall=1 2/13
10/20/23, 10:48 PM PRELIM EXAM: Attempt review
Question 8
Correct
Political risks (inc. petty & violent crime, civil conflicts, protests, strikes, and terrorism)
Select one:
True
False
Question 9
Correct
It enables you to access the information only if you have both a physical object (like a card) and an immaterial one (like a security
code).
Question 10
Correct
It occurs by utilizing character substitution with a key that will be the only means of decrypting the bits of information.
Question 11
Correct
https://trimestralexam.amaesonline.com/2313/mod/quiz/review.php?attempt=75448&cmid=1678&showall=1 3/13
10/20/23, 10:48 PM PRELIM EXAM: Attempt review
Question 12
Correct
As cyber attack threats increase, information security experts are pushing for more focus on protecting the companies from losing
time due to network defense disruptions.
Select one:
True
False
Question 13
Correct
This is used when there are two keys, a public key, and a private key.
Question 14
Correct
A principle that is a core requirement of information security for the safe utilization, flow, and storage of information is the CIA triad.
Select one:
True
False
Question 15
Correct
Select one:
True
False
https://trimestralexam.amaesonline.com/2313/mod/quiz/review.php?attempt=75448&cmid=1678&showall=1 4/13
10/20/23, 10:48 PM PRELIM EXAM: Attempt review
Question 16
Correct
The aim of confidentiality is to ensure that information is hidden from people unauthorized to access it.
Select one:
True
False
Question 17
Correct
Cryptography consists of changing the data located in files into unreadable bits of characters unless a key to decode the file is
provided.
Select one:
True
False
Question 18
Correct
Select one:
True
False
Question 19
Correct
It utilizes packet filtering to examine the header of a packet and decide if the packet should be forwarded or dropped.
https://trimestralexam.amaesonline.com/2313/mod/quiz/review.php?attempt=75448&cmid=1678&showall=1 5/13
10/20/23, 10:48 PM PRELIM EXAM: Attempt review
Question 20
Correct
Information security, otherwise called Infosec, is a procedure of planning techniques, instruments, and approaches to identify, report,
avert, and battle dangers focused on computerized and non-advanced data gadgets.
Select one:
True
False
Question 21
Correct
Organizations do not recognize the importance of having roadblocks to protect private information from becoming public.
Select one:
True
False
Question 22
Correct
This principle dictates that information should solely be viewed by people with appropriate and correct privileges.
Answer: CONFIDENTIALITY
Question 23
Correct
It should be a mixture of lowercase and uppercase letters, numbers, and symbols and be at least 10 characters long, preferably 12 or
more.
https://trimestralexam.amaesonline.com/2313/mod/quiz/review.php?attempt=75448&cmid=1678&showall=1 6/13
10/20/23, 10:48 PM PRELIM EXAM: Attempt review
Question 24
Correct
It describes the notion that access to end-user applications has to be constrained to business ought-to-know.
Question 25
Correct
Modem, another piece of hardware, can regulate access to the network, just like firewalls, it may have access lists that allow or deny
access into the network.
Select one:
True
False
Question 26
Correct
They create an in-office network for a small business or a cloud infrastructure for a business with corporate locations in cities on
opposite coasts.
Question 27
Correct
An accepted and effective way of protecting data in transit but is increasingly being used for protecting data at rest as well.
Answer: ENCRYPTION
https://trimestralexam.amaesonline.com/2313/mod/quiz/review.php?attempt=75448&cmid=1678&showall=1 7/13
10/20/23, 10:48 PM PRELIM EXAM: Attempt review
Question 28
Correct
A piece of equipment or software that is designed to block unsolicited connections, protocols, unwanted network activity, and block
spam and other malicious requests while you are connected to a third-party network (usually the Internet).
Answer: FIREWALL
Question 29
Correct
The establishment of the Enigma rotor machine and the subsequent emergence of electronics and computing enabled the usage of
much more elaborate schemes and allowed confidentiality to be protected much more effectively.
Select one:
True
False
Question 30
Correct
It enforces information security measures, and the violation of these may cost heavily to the businesses.
Question 31
Correct
Travelers may also find it challenging to get around certain due to poor aviation safety standards and large areas of poorly
maintained roads that make driving difficult.
Select one:
True
False
https://trimestralexam.amaesonline.com/2313/mod/quiz/review.php?attempt=75448&cmid=1678&showall=1 8/13
10/20/23, 10:48 PM PRELIM EXAM: Attempt review
Question 32
Correct
Requiring two-factor authentication increases the safety of the confidential data and decreases the probability of data leakage.
Select one:
True
False
Question 33
Incorrect
Its threats account for 25% of more than $600 billion in costs of cybercrime to the world economy.
Answer: CYBERCRIME
Question 34
Correct
Question 35
Correct
They are implemented at the local level; they involve authentication like logins and passwords.
https://trimestralexam.amaesonline.com/2313/mod/quiz/review.php?attempt=75448&cmid=1678&showall=1 9/13
10/20/23, 10:48 PM PRELIM EXAM: Attempt review
Question 36
Correct
Drafting a successful confidentiality agreement that would effectively protect confidential data.
Select one:
True
False
Question 37
Correct
Select one:
True
False
Question 38
Correct
The Application Access Layer describes the notion that data ought to be secured while in motion.
Select one:
True
False
Question 39
Correct
It describes the notion that the physical access to any system, server, computer, data center, or another physical object storing
confidential information has to be constrained to business ought-to-know.
https://trimestralexam.amaesonline.com/2313/mod/quiz/review.php?attempt=75448&cmid=1678&showall=1 10/13
10/20/23, 10:48 PM PRELIM EXAM: Attempt review
Question 40
Correct
When information security community members participated in the Cybersecurity Trends Report, they were asked how positive they
felt about the security stance.
Select one:
True
False
Question 41
Correct
Environmental risks (inc. road safety and standards, provision of utilities such as electricity, cybercrime, and aviation security and
standards).
Select one:
True
False
Question 42
Correct
Information security analysts monitor the designs of computer programs and applications and design how those pieces work
together.
Select one:
True
False
Question 43
Correct
They are implemented at the local level; they involve authentication like logins and passwords.
https://trimestralexam.amaesonline.com/2313/mod/quiz/review.php?attempt=75448&cmid=1678&showall=1 11/13
10/20/23, 10:48 PM PRELIM EXAM: Attempt review
Question 44
Correct
Information systems managers work towards ensuring the company’s technology is capable of meeting their IT goals.
Select one:
True
False
Question 45
Correct
It consists of the presence of diseases, the standard of medical facilities, access to water, and the availability of pharmaceuticals.
Question 46
Correct
Encryption is an accepted and effective way of protecting data in transit but is increasingly being used for protecting data at rest as
well.
Select one:
True
False
Question 47
Correct
The Infrastructure Access Layer describes the notion that access to end-user applications has to be constrained to business ought-to-
know.
Select one:
True
False
https://trimestralexam.amaesonline.com/2313/mod/quiz/review.php?attempt=75448&cmid=1678&showall=1 12/13
10/20/23, 10:48 PM PRELIM EXAM: Attempt review
Question 48
Correct
The computer network architects monitor the company’s computer networks to combat hackers and compile reports of security
breaches.
Select one:
True
False
Question 49
Correct
The encryption happens automatically without any intervention on the side of the user.
Question 50
Correct
It includes road safety and standards, provision of utilities such as electricity, cybercrime, and aviation security and standards.
◄ Announcements
Jump to...
https://trimestralexam.amaesonline.com/2313/mod/quiz/review.php?attempt=75448&cmid=1678&showall=1 13/13