O'Reilly logo

CCNA Cyber Ops SECOPS 210-255 Official Cert Guide by Stefano De Crescenzo, Joseph Muniz, Omar Santos

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Appendix A. Answers to the “Do I Know This Already?” Quizzes and Q&A

Do I Know This Already? Answers

Chapter 1

1. C. Encryption is often used to maintain confidentiality. An example is the use of encryption in virtual private networks (VPNs).

2. B. Integrity protection encompasses more than just data; it not only protects data, but also operating systems, applications, and hardware from being altered by unauthorized individuals.

3. A and C. STRIDE, DREAD, and attack trees are examples of threat modeling techniques.

4. C. Damage potential, reproducibility, exploitability, affected users, and discoverability are the components of DREAD.

5. A. Spoofing, tampering, repudiation, information disclosure, denial of service, and elevation of privilege ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required