D430 Fundamentals of Information Security - Set 1 - Part 1

Test your knowledge of technical writing concepts with these practice questions. Each question includes detailed explanations to help you understand the correct answers.

Question 1: Which regulation mandates that financial institutions explain their information-sharing practices and safeguard customer data?

Question 2: Which law protects the privacy of student educational records?

Question 3: Which cryptographic method uses two keys, one public and one private, to secure communication?

Question 4: Which of the following security principles ensures that data can only be accessed by authorized individuals?

Question 5: Which law provides a framework to protect the security of government information and operations?

Question 6: What are the three states of data in information security?

Question 7: Which of the following describes the process of gathering intelligence to support business decisions?

Question 8: Which type of algorithm is RSA?

Question 9: Which process is responsible for determining the weaknesses that may be exploited in an organization’s systems?

Question 10: Which law specifically protects electronic health records?

Question 11: Which of the following is a method of securing endpoints such as desktops and mobile devices?

Question 12: Which attack occurs when an attacker injects malicious scripts into a trusted website?

Question 13: Which model adds possession or control, utility, and authenticity to the traditional CIA triad?

Question 14: What is the main purpose of encryption in data security?

Question 15: Which of the following defines the principle of least privilege?

Question 16: Which of the following is an attack that aims to exhaust a system's resources, making it unavailable to users?

Question 17: What type of access control model is most commonly used in military environments where access decisions are made based on security classifications?

Question 18: Which of the following is a cryptographic hashing algorithm used to ensure data integrity?

Question 19: Which attack takes advantage of weaknesses in input validation to execute arbitrary code or commands?

Question 20: Which encryption algorithm is widely used in government agencies and is considered the standard for data encryption?


Complete the Captcha to view next question set.

Need Guaranteed Results?

Our exam support service guarantees you'll pass your OA on the first attempt. Pay only after you pass!

Get Exam Support