CYSE 101 MIDTERM 1 QUESTIONS AND ANSWERS
In a data breach (such as the OPM case) which security characteristic of data has been violated? - Answer- Confidentiality Which of the following about vulnerabilities and threats is *not* true? - Answer- A vulnerability or a threat, but not both, are required to create risk Considering the CIA triad and the Parkerian hexad, which of the following is true? - Answer- Parkerian is more complete but not as widely known Which of the following is *not* true about complex and automatically generated passwords that are unique to each system and are a minimum of 30 characters in length, such as !Hs4(j0qO$&zn1%2SK38cn^!Ks620! ? - Answer- Brute force password crackers will break them as quickly as a 4-digit PIN Which of the following would *not* be part of a solution in the Polycom case study - Answer- Off site backups Which of the following is true regarding the history of cybersecurity as presented in class and the associated document? - Answer- Advances (firewalls, intrusion detection, encryption algorithms, etc.) often followed attacks or apparent weaknesses What does the concept of defense in depth mean? - Answer- Protect your data and systems with tools and techniques from different layers The primary vulnerability in the Lodz Tram Hack case study was: - Answer- Lack of authentication Which of the following would *not* be considered a logical (technical) control? - Answer- fences How do we know at what point we can consider our environment to be secure? - Answer- Never; perfect security does not exist If we are using an identity card such as a driver's license as the basis for our authentication scheme, which of the following additions would *not* represent multifactor authentication? - Answer- A birth certificate What do we call the rate at which we fail to authenticate legitimate users in a biometric system? - Answer- False Rejection Rate (FRR) What do we call the process in which the client authenticates to the server and the server authenticates to the client? - Answer- Mutual authentication
Geschreven voor
- Instelling
- CYSE 101
- Vak
- CYSE 101
Documentinformatie
- Geüpload op
- 24 oktober 2023
- Aantal pagina's
- 4
- Geschreven in
- 2023/2024
- Type
- Tentamen (uitwerkingen)
- Bevat
- Vragen en antwoorden
Onderwerpen
-
cyse 101 midterm 1 questions and answers
-
in a data breach such as the opm case which secu
-
which of the following about vulnerabilities and t
-
considering the cia triad and the parkerian hexad