1. What are some examples of security goals that you may have for an organization? Check all that apply. Answers To protect customer data from
Category: Google IT Support
1. What is an attack vector? Answers The classification of attack type The direction an attack is going in A mechanism by which an attacker
1. Why is normalizing log data important in a centralized logging setup? Answers Log normalizing detects potential attacks. Uniformly formatted logs are easier to store
1. How is authentication different from authorization? Answers Authentication is verifying access to a resource; authorization is verifying an identity. Authentication is identifying a resource; authorization is
1. In the CIA Triad, “Confidentiality” means ensuring that data is: Answers accurate and was not tampered with. available and that people can access it.
1. What are the components that make up a cryptosystem? Check all that apply. Answers Key generation algorithms Encryption algorithms Transmission algorithms Decryption algorithms 2.
1. How can you recover from an unexpected data loss event? Select all that apply. Answers Restore data from backups Design a disaster recovery plan
1. What does a directory server provide? Answers A real-time communication service. A replication service. A lookup service for an organization. A network time service.
1. What are some communication services you can utilize in your organization? Check all that apply. Answers Email Chat applications DNS Phones 2. What’s the difference
1. Which of the following are considered part of the physical infrastructure service? Check all that apply. Answers Laptop Rack server Desktop Operating systems 2.